Advertisement
Guest User

fail2ban.log

a guest
Feb 25th, 2016
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.67 KB | None | 0 0
  1. 2016-02-25 22:55:08,246 fail2ban.server [19644]: INFO Stopping all jails
  2. 2016-02-25 22:55:08,932 fail2ban.jail [19644]: INFO Jail 'rainloop' stopped
  3. 2016-02-25 22:55:09,936 fail2ban.jail [19644]: INFO Jail 'ssh' stopped
  4. 2016-02-25 22:55:10,951 fail2ban.jail [19644]: INFO Jail 'roundcube' stopped
  5. 2016-02-25 22:55:11,979 fail2ban.jail [19644]: INFO Jail 'imscp' stopped
  6. 2016-02-25 22:55:11,980 fail2ban.server [19644]: INFO Exiting Fail2ban
  7. 2016-02-25 22:55:12,542 fail2ban.server [19891]: INFO Changed logging target to /var/log/fail2ban.log for Fail2ban v0.8.13
  8. 2016-02-25 22:55:12,542 fail2ban.comm [19891]: DEBUG Command: ['add', 'ssh', 'auto']
  9. 2016-02-25 22:55:12,543 fail2ban.jail [19891]: INFO Creating new jail 'ssh'
  10. 2016-02-25 22:55:12,565 fail2ban.jail [19891]: INFO Jail 'ssh' uses pyinotify
  11. 2016-02-25 22:55:12,576 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh'))
  12. 2016-02-25 22:55:12,581 fail2ban.filter [19891]: DEBUG Created FilterPyinotify(Jail('ssh'))
  13. 2016-02-25 22:55:12,585 fail2ban.filter [19891]: DEBUG Created FilterPyinotify
  14. 2016-02-25 22:55:12,586 fail2ban.jail [19891]: INFO Initiated 'pyinotify' backend
  15. 2016-02-25 22:55:12,586 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'usedns', 'warn']
  16. 2016-02-25 22:55:12,586 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('ssh'))
  17. 2016-02-25 22:55:12,587 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addlogpath', '/var/log/auth.log']
  18. 2016-02-25 22:55:12,587 fail2ban.filter [19891]: INFO Added logfile = /var/log/auth.log
  19. 2016-02-25 22:55:12,587 fail2ban.filter [19891]: DEBUG Added monitor for the parent directory /var/log
  20. 2016-02-25 22:55:12,587 fail2ban.filter [19891]: DEBUG Added file watcher for /var/log/auth.log
  21. 2016-02-25 22:55:12,587 fail2ban.filter.datedetector[19891]: DEBUG Sorting the template list
  22. 2016-02-25 22:55:12,587 fail2ban.filter.datedetector[19891]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
  23. 2016-02-25 22:55:12,588 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'maxretry', '6']
  24. 2016-02-25 22:55:12,588 fail2ban.filter [19891]: INFO Set maxRetry = 6
  25. 2016-02-25 22:55:12,588 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addignoreip', '127.0.0.1/8']
  26. 2016-02-25 22:55:12,588 fail2ban.filter [19891]: DEBUG Add 127.0.0.1/8 to ignore list
  27. 2016-02-25 22:55:12,589 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'ignorecommand', '']
  28. 2016-02-25 22:55:12,589 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'findtime', '600']
  29. 2016-02-25 22:55:12,589 fail2ban.filter [19891]: INFO Set findtime = 600
  30. 2016-02-25 22:55:12,589 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'bantime', '600']
  31. 2016-02-25 22:55:12,589 fail2ban.actions[19891]: INFO Set banTime = 600
  32. 2016-02-25 22:55:12,590 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?[aA]uthentication (?:failure|error) for .* from <HOST>( via \\S+)?\\s*$']
  33. 2016-02-25 22:55:12,591 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\\s*$']
  34. 2016-02-25 22:55:12,593 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Failed \\S+ for .*? from <HOST>(?: port \\d*)?(?: ssh\\d*)?(: (ruser .*|(\\S+ ID \\S+ \\(serial \\d+\\) CA )?\\S+ (?:[\\da-f]{2}:){15}[\\da-f]{2}(, client user ".*", client host ".*")?))?\\s*$']
  35. 2016-02-25 22:55:12,595 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*ROOT LOGIN REFUSED.* FROM <HOST>\\s*$']
  36. 2016-02-25 22:55:12,597 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*[iI](?:llegal|nvalid) user .* from <HOST>\\s*$']
  37. 2016-02-25 22:55:12,599 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not listed in AllowUsers\\s*$']
  38. 2016-02-25 22:55:12,600 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because listed in DenyUsers\\s*$']
  39. 2016-02-25 22:55:12,602 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because not in any group\\s*$']
  40. 2016-02-25 22:55:12,604 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*refused connect from \\S+ \\(<HOST>\\)\\s*$']
  41. 2016-02-25 22:55:12,606 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*Received disconnect from <HOST>: 3: \\S+: Auth fail$']
  42. 2016-02-25 22:55:12,609 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', '^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because a group is listed in DenyGroups\\s*$']
  43. 2016-02-25 22:55:12,611 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addfailregex', "^\\s*(<[^.]+\\.[^.]+>)?\\s*(?:\\S+ )?(?:kernel: \\[ *\\d+\\.\\d+\\] )?(?:@vserver_\\S+ )?(?:(?:\\[\\d+\\])?:\\s+[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?|[\\[\\(]?sshd(?:\\(\\S+\\))?[\\]\\)]?:?(?:\\[\\d+\\])?:?)?\\s(?:\\[ID \\d+ \\S+\\])?\\s*User .+ from <HOST> not allowed because none of user's groups are listed in AllowGroups\\s*$"]
  44. 2016-02-25 22:55:12,614 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'addaction', 'sendmail-whois']
  45. 2016-02-25 22:55:12,614 fail2ban.actions.action[19891]: DEBUG Created Action
  46. 2016-02-25 22:55:12,614 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'actionban', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban after\n<failures> attempts against <name>.\\n\\n\nHere is more information about <ip>:\\n\n`/usr/bin/whois <ip> || echo missing whois program`\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  47. 2016-02-25 22:55:12,614 fail2ban.actions.action[19891]: DEBUG Set actionBan = printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`
  48. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  49. From: <sendername> <<sender>>
  50. To: <dest>\n
  51. Hi,\n
  52. The IP <ip> has just been banned by Fail2Ban after
  53. <failures> attempts against <name>.\n\n
  54. Here is more information about <ip>:\n
  55. `/usr/bin/whois <ip> || echo missing whois program`\n
  56. Regards,\n
  57. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  58. 2016-02-25 22:55:12,615 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'actionstop', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  59. 2016-02-25 22:55:12,615 fail2ban.actions.action[19891]: DEBUG Set actionStop = printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`
  60. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  61. From: <sendername> <<sender>>
  62. To: <dest>\n
  63. Hi,\n
  64. The jail <name> has been stopped.\n
  65. Regards,\n
  66. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  67. 2016-02-25 22:55:12,615 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'actionstart', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been started successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  68. 2016-02-25 22:55:12,615 fail2ban.actions.action[19891]: DEBUG Set actionStart = printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`
  69. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  70. From: <sendername> <<sender>>
  71. To: <dest>\n
  72. Hi,\n
  73. The jail <name> has been started successfully.\n
  74. Regards,\n
  75. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  76. 2016-02-25 22:55:12,615 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'actionunban', 'sendmail-whois', '']
  77. 2016-02-25 22:55:12,615 fail2ban.actions.action[19891]: DEBUG Set actionUnban =
  78. 2016-02-25 22:55:12,616 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'actioncheck', 'sendmail-whois', '']
  79. 2016-02-25 22:55:12,616 fail2ban.actions.action[19891]: DEBUG Set actionCheck =
  80. 2016-02-25 22:55:12,616 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'setcinfo', 'sendmail-whois', 'dest', 'info@gmail.com']
  81. 2016-02-25 22:55:12,616 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'setcinfo', 'sendmail-whois', 'sendername', 'Fail2Ban']
  82. 2016-02-25 22:55:12,617 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'setcinfo', 'sendmail-whois', 'logpath', '/var/log/auth.log']
  83. 2016-02-25 22:55:12,617 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'setcinfo', 'sendmail-whois', 'name', 'SSH']
  84. 2016-02-25 22:55:12,617 fail2ban.comm [19891]: DEBUG Command: ['set', 'ssh', 'setcinfo', 'sendmail-whois', 'sender', 'fail2ban@localhost']
  85. 2016-02-25 22:55:12,618 fail2ban.comm [19891]: DEBUG Command: ['add', 'roundcube', 'auto']
  86. 2016-02-25 22:55:12,618 fail2ban.jail [19891]: INFO Creating new jail 'roundcube'
  87. 2016-02-25 22:55:12,618 fail2ban.jail [19891]: INFO Jail 'roundcube' uses pyinotify
  88. 2016-02-25 22:55:12,618 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('roundcube'))
  89. 2016-02-25 22:55:12,618 fail2ban.filter [19891]: DEBUG Created FilterPyinotify(Jail('roundcube'))
  90. 2016-02-25 22:55:12,622 fail2ban.filter [19891]: DEBUG Created FilterPyinotify
  91. 2016-02-25 22:55:12,622 fail2ban.jail [19891]: INFO Initiated 'pyinotify' backend
  92. 2016-02-25 22:55:12,622 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'usedns', 'warn']
  93. 2016-02-25 22:55:12,623 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('roundcube'))
  94. 2016-02-25 22:55:12,623 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'addlogpath', '/var/www/imscp/gui/public/tools/webmail/logs/errors']
  95. 2016-02-25 22:55:12,623 fail2ban.filter [19891]: INFO Added logfile = /var/www/imscp/gui/public/tools/webmail/logs/errors
  96. 2016-02-25 22:55:12,623 fail2ban.filter [19891]: DEBUG Added monitor for the parent directory /var/www/imscp/gui/public/tools/webmail/logs
  97. 2016-02-25 22:55:12,623 fail2ban.filter [19891]: DEBUG Added file watcher for /var/www/imscp/gui/public/tools/webmail/logs/errors
  98. 2016-02-25 22:55:12,624 fail2ban.filter.datedetector[19891]: DEBUG Sorting the template list
  99. 2016-02-25 22:55:12,624 fail2ban.filter.datedetector[19891]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
  100. 2016-02-25 22:55:12,624 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'maxretry', '6']
  101. 2016-02-25 22:55:12,624 fail2ban.filter [19891]: INFO Set maxRetry = 6
  102. 2016-02-25 22:55:12,625 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'addignoreip', '127.0.0.1/8']
  103. 2016-02-25 22:55:12,625 fail2ban.filter [19891]: DEBUG Add 127.0.0.1/8 to ignore list
  104. 2016-02-25 22:55:12,625 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'ignorecommand', '']
  105. 2016-02-25 22:55:12,625 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'findtime', '600']
  106. 2016-02-25 22:55:12,626 fail2ban.filter [19891]: INFO Set findtime = 600
  107. 2016-02-25 22:55:12,626 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'bantime', '600']
  108. 2016-02-25 22:55:12,626 fail2ban.actions[19891]: INFO Set banTime = 600
  109. 2016-02-25 22:55:12,626 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'addfailregex', '.*Error: Login failed for .* from <HOST>\\..*']
  110. 2016-02-25 22:55:12,627 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'addaction', 'sendmail-whois']
  111. 2016-02-25 22:55:12,628 fail2ban.actions.action[19891]: DEBUG Created Action
  112. 2016-02-25 22:55:12,628 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'actionban', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban after\n<failures> attempts against <name>.\\n\\n\nHere is more information about <ip>:\\n\n`/usr/bin/whois <ip> || echo missing whois program`\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  113. 2016-02-25 22:55:12,628 fail2ban.actions.action[19891]: DEBUG Set actionBan = printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`
  114. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  115. From: <sendername> <<sender>>
  116. To: <dest>\n
  117. Hi,\n
  118. The IP <ip> has just been banned by Fail2Ban after
  119. <failures> attempts against <name>.\n\n
  120. Here is more information about <ip>:\n
  121. `/usr/bin/whois <ip> || echo missing whois program`\n
  122. Regards,\n
  123. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  124. 2016-02-25 22:55:12,629 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'actionstop', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  125. 2016-02-25 22:55:12,629 fail2ban.actions.action[19891]: DEBUG Set actionStop = printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`
  126. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  127. From: <sendername> <<sender>>
  128. To: <dest>\n
  129. Hi,\n
  130. The jail <name> has been stopped.\n
  131. Regards,\n
  132. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  133. 2016-02-25 22:55:12,629 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'actionstart', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been started successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  134. 2016-02-25 22:55:12,629 fail2ban.actions.action[19891]: DEBUG Set actionStart = printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`
  135. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  136. From: <sendername> <<sender>>
  137. To: <dest>\n
  138. Hi,\n
  139. The jail <name> has been started successfully.\n
  140. Regards,\n
  141. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  142. 2016-02-25 22:55:12,630 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'actionunban', 'sendmail-whois', '']
  143. 2016-02-25 22:55:12,630 fail2ban.actions.action[19891]: DEBUG Set actionUnban =
  144. 2016-02-25 22:55:12,630 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'actioncheck', 'sendmail-whois', '']
  145. 2016-02-25 22:55:12,630 fail2ban.actions.action[19891]: DEBUG Set actionCheck =
  146. 2016-02-25 22:55:12,631 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'setcinfo', 'sendmail-whois', 'dest', 'info@gmail.com']
  147. 2016-02-25 22:55:12,631 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'setcinfo', 'sendmail-whois', 'sendername', 'Fail2Ban']
  148. 2016-02-25 22:55:12,631 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'setcinfo', 'sendmail-whois', 'logpath', '/var/www/imscp/gui/public/tools/webmail/logs/errors']
  149. 2016-02-25 22:55:12,632 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'setcinfo', 'sendmail-whois', 'name', 'roundcube']
  150. 2016-02-25 22:55:12,632 fail2ban.comm [19891]: DEBUG Command: ['set', 'roundcube', 'setcinfo', 'sendmail-whois', 'sender', 'fail2ban@localhost']
  151. 2016-02-25 22:55:12,633 fail2ban.comm [19891]: DEBUG Command: ['add', 'rainloop', 'auto']
  152. 2016-02-25 22:55:12,633 fail2ban.jail [19891]: INFO Creating new jail 'rainloop'
  153. 2016-02-25 22:55:12,633 fail2ban.jail [19891]: INFO Jail 'rainloop' uses pyinotify
  154. 2016-02-25 22:55:12,633 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('rainloop'))
  155. 2016-02-25 22:55:12,633 fail2ban.filter [19891]: DEBUG Created FilterPyinotify(Jail('rainloop'))
  156. 2016-02-25 22:55:12,638 fail2ban.filter [19891]: DEBUG Created FilterPyinotify
  157. 2016-02-25 22:55:12,638 fail2ban.jail [19891]: INFO Initiated 'pyinotify' backend
  158. 2016-02-25 22:55:12,639 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'usedns', 'warn']
  159. 2016-02-25 22:55:12,639 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('rainloop'))
  160. 2016-02-25 22:55:12,640 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'addlogpath', '/var/log/nginx/access.log']
  161. 2016-02-25 22:55:12,640 fail2ban.filter [19891]: INFO Added logfile = /var/log/nginx/access.log
  162. 2016-02-25 22:55:12,640 fail2ban.filter [19891]: DEBUG Added monitor for the parent directory /var/log/nginx
  163. 2016-02-25 22:55:12,641 fail2ban.filter [19891]: DEBUG Added file watcher for /var/log/nginx/access.log
  164. 2016-02-25 22:55:12,641 fail2ban.filter.datedetector[19891]: DEBUG Sorting the template list
  165. 2016-02-25 22:55:12,641 fail2ban.filter.datedetector[19891]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
  166. 2016-02-25 22:55:12,642 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'maxretry', '6']
  167. 2016-02-25 22:55:12,642 fail2ban.filter [19891]: INFO Set maxRetry = 6
  168. 2016-02-25 22:55:12,642 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'addignoreip', '127.0.0.1/8']
  169. 2016-02-25 22:55:12,642 fail2ban.filter [19891]: DEBUG Add 127.0.0.1/8 to ignore list
  170. 2016-02-25 22:55:12,643 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'ignorecommand', '']
  171. 2016-02-25 22:55:12,643 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'findtime', '600']
  172. 2016-02-25 22:55:12,643 fail2ban.filter [19891]: INFO Set findtime = 600
  173. 2016-02-25 22:55:12,644 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'bantime', '600']
  174. 2016-02-25 22:55:12,644 fail2ban.actions[19891]: INFO Set banTime = 600
  175. 2016-02-25 22:55:12,644 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'addfailregex', '^<HOST> -.*POST /rainloop/index.php\\?/Ajax/0/ HTTP/1.1" 200']
  176. 2016-02-25 22:55:12,645 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'addaction', 'iptables-multiport']
  177. 2016-02-25 22:55:12,645 fail2ban.actions.action[19891]: DEBUG Created Action
  178. 2016-02-25 22:55:12,646 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'actionban', 'iptables-multiport', 'iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>']
  179. 2016-02-25 22:55:12,646 fail2ban.actions.action[19891]: DEBUG Set actionBan = iptables -I fail2ban-<name> 1 -s <ip> -j <blocktype>
  180. 2016-02-25 22:55:12,646 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'actionstop', 'iptables-multiport', 'iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>\niptables -F fail2ban-<name>\niptables -X fail2ban-<name>']
  181. 2016-02-25 22:55:12,647 fail2ban.actions.action[19891]: DEBUG Set actionStop = iptables -D <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
  182. iptables -F fail2ban-<name>
  183. iptables -X fail2ban-<name>
  184. 2016-02-25 22:55:12,647 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'actionstart', 'iptables-multiport', 'iptables -N fail2ban-<name>\niptables -A fail2ban-<name> -j RETURN\niptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>']
  185. 2016-02-25 22:55:12,647 fail2ban.actions.action[19891]: DEBUG Set actionStart = iptables -N fail2ban-<name>
  186. iptables -A fail2ban-<name> -j RETURN
  187. iptables -I <chain> -p <protocol> -m multiport --dports <port> -j fail2ban-<name>
  188. 2016-02-25 22:55:12,648 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'actionunban', 'iptables-multiport', 'iptables -D fail2ban-<name> -s <ip> -j <blocktype>']
  189. 2016-02-25 22:55:12,648 fail2ban.actions.action[19891]: DEBUG Set actionUnban = iptables -D fail2ban-<name> -s <ip> -j <blocktype>
  190. 2016-02-25 22:55:12,648 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'actioncheck', 'iptables-multiport', "iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \\t]'"]
  191. 2016-02-25 22:55:12,648 fail2ban.actions.action[19891]: DEBUG Set actionCheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
  192. 2016-02-25 22:55:12,649 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'setcinfo', 'iptables-multiport', 'blocktype', 'REJECT --reject-with icmp-port-unreachable']
  193. 2016-02-25 22:55:12,649 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'setcinfo', 'iptables-multiport', 'protocol', 'tcp']
  194. 2016-02-25 22:55:12,649 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'setcinfo', 'iptables-multiport', 'name', 'rainloop']
  195. 2016-02-25 22:55:12,650 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'setcinfo', 'iptables-multiport', 'chain', 'INPUT']
  196. 2016-02-25 22:55:12,650 fail2ban.comm [19891]: DEBUG Command: ['set', 'rainloop', 'setcinfo', 'iptables-multiport', 'port', '8080,4443']
  197. 2016-02-25 22:55:12,650 fail2ban.comm [19891]: DEBUG Command: ['add', 'imscp', 'auto']
  198. 2016-02-25 22:55:12,651 fail2ban.jail [19891]: INFO Creating new jail 'imscp'
  199. 2016-02-25 22:55:12,651 fail2ban.jail [19891]: INFO Jail 'imscp' uses pyinotify
  200. 2016-02-25 22:55:12,651 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('imscp'))
  201. 2016-02-25 22:55:12,651 fail2ban.filter [19891]: DEBUG Created FilterPyinotify(Jail('imscp'))
  202. 2016-02-25 22:55:12,655 fail2ban.filter [19891]: DEBUG Created FilterPyinotify
  203. 2016-02-25 22:55:12,655 fail2ban.jail [19891]: INFO Initiated 'pyinotify' backend
  204. 2016-02-25 22:55:12,656 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'usedns', 'warn']
  205. 2016-02-25 22:55:12,656 fail2ban.filter [19891]: DEBUG Setting usedns = warn for FilterPyinotify(Jail('imscp'))
  206. 2016-02-25 22:55:12,656 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'addlogpath', '/var/log/nginx/error.log']
  207. 2016-02-25 22:55:12,657 fail2ban.filter [19891]: INFO Added logfile = /var/log/nginx/error.log
  208. 2016-02-25 22:55:12,657 fail2ban.filter [19891]: DEBUG Added monitor for the parent directory /var/log/nginx
  209. 2016-02-25 22:55:12,657 fail2ban.filter [19891]: DEBUG Added file watcher for /var/log/nginx/error.log
  210. 2016-02-25 22:55:12,657 fail2ban.filter.datedetector[19891]: DEBUG Sorting the template list
  211. 2016-02-25 22:55:12,658 fail2ban.filter.datedetector[19891]: DEBUG Winning template: WEEKDAY MONTH Day Hour:Minute:Second[.subsecond] Year with 0 hits
  212. 2016-02-25 22:55:12,658 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'maxretry', '6']
  213. 2016-02-25 22:55:12,658 fail2ban.filter [19891]: INFO Set maxRetry = 6
  214. 2016-02-25 22:55:12,658 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'addignoreip', '127.0.0.1/8']
  215. 2016-02-25 22:55:12,659 fail2ban.filter [19891]: DEBUG Add 127.0.0.1/8 to ignore list
  216. 2016-02-25 22:55:12,659 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'ignorecommand', '']
  217. 2016-02-25 22:55:12,659 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'findtime', '600']
  218. 2016-02-25 22:55:12,659 fail2ban.filter [19891]: INFO Set findtime = 600
  219. 2016-02-25 22:55:12,660 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'bantime', '600']
  220. 2016-02-25 22:55:12,660 fail2ban.actions[19891]: INFO Set banTime = 600
  221. 2016-02-25 22:55:12,660 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'addfailregex', '^ \\[error\\] \\d+#\\d+: \\*\\d+ user "\\S+":? (password mismatch|was not found in ".*"), client: <HOST>, server: \\S+, request: "\\S+ \\S+ HTTP/\\d+\\.\\d+", host: "\\S+"\\s*$']
  222. 2016-02-25 22:55:12,662 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'addaction', 'sendmail-whois']
  223. 2016-02-25 22:55:12,662 fail2ban.actions.action[19891]: DEBUG Created Action
  224. 2016-02-25 22:55:12,662 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'actionban', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe IP <ip> has just been banned by Fail2Ban after\n<failures> attempts against <name>.\\n\\n\nHere is more information about <ip>:\\n\n`/usr/bin/whois <ip> || echo missing whois program`\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  225. 2016-02-25 22:55:12,663 fail2ban.actions.action[19891]: DEBUG Set actionBan = printf %b "Subject: [Fail2Ban] <name>: banned <ip> from `uname -n`
  226. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  227. From: <sendername> <<sender>>
  228. To: <dest>\n
  229. Hi,\n
  230. The IP <ip> has just been banned by Fail2Ban after
  231. <failures> attempts against <name>.\n\n
  232. Here is more information about <ip>:\n
  233. `/usr/bin/whois <ip> || echo missing whois program`\n
  234. Regards,\n
  235. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  236. 2016-02-25 22:55:12,663 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'actionstop', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been stopped.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  237. 2016-02-25 22:55:12,663 fail2ban.actions.action[19891]: DEBUG Set actionStop = printf %b "Subject: [Fail2Ban] <name>: stopped on `uname -n`
  238. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  239. From: <sendername> <<sender>>
  240. To: <dest>\n
  241. Hi,\n
  242. The jail <name> has been stopped.\n
  243. Regards,\n
  244. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  245. 2016-02-25 22:55:12,664 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'actionstart', 'sendmail-whois', 'printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`\nDate: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`\nFrom: <sendername> <<sender>>\nTo: <dest>\\n\nHi,\\n\nThe jail <name> has been started successfully.\\n\nRegards,\\n\nFail2Ban" | /usr/sbin/sendmail -f <sender> <dest>']
  246. 2016-02-25 22:55:12,664 fail2ban.actions.action[19891]: DEBUG Set actionStart = printf %b "Subject: [Fail2Ban] <name>: started on `uname -n`
  247. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  248. From: <sendername> <<sender>>
  249. To: <dest>\n
  250. Hi,\n
  251. The jail <name> has been started successfully.\n
  252. Regards,\n
  253. Fail2Ban" | /usr/sbin/sendmail -f <sender> <dest>
  254. 2016-02-25 22:55:12,664 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'actionunban', 'sendmail-whois', '']
  255. 2016-02-25 22:55:12,664 fail2ban.actions.action[19891]: DEBUG Set actionUnban =
  256. 2016-02-25 22:55:12,665 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'actioncheck', 'sendmail-whois', '']
  257. 2016-02-25 22:55:12,665 fail2ban.actions.action[19891]: DEBUG Set actionCheck =
  258. 2016-02-25 22:55:12,665 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'setcinfo', 'sendmail-whois', 'dest', 'info@gmail.com']
  259. 2016-02-25 22:55:12,666 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'setcinfo', 'sendmail-whois', 'sendername', 'Fail2Ban']
  260. 2016-02-25 22:55:12,666 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'setcinfo', 'sendmail-whois', 'logpath', '/var/log/nginx/*error.log']
  261. 2016-02-25 22:55:12,666 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'setcinfo', 'sendmail-whois', 'name', 'imscp']
  262. 2016-02-25 22:55:12,667 fail2ban.comm [19891]: DEBUG Command: ['set', 'imscp', 'setcinfo', 'sendmail-whois', 'sender', 'fail2ban@localhost']
  263. 2016-02-25 22:55:12,667 fail2ban.comm [19891]: DEBUG Command: ['start', 'ssh']
  264. 2016-02-25 22:55:12,668 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] SSH: started on `uname -n`
  265. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  266. From: Fail2Ban <fail2ban@localhost>
  267. To: info@gmail.com\n
  268. Hi,\n
  269. The jail SSH has been started successfully.\n
  270. Regards,\n
  271. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com
  272. 2016-02-25 22:55:12,668 fail2ban.jail [19891]: INFO Jail 'ssh' started
  273. 2016-02-25 22:55:12,668 fail2ban.filter [19891]: DEBUG pyinotifier started for ssh.
  274. 2016-02-25 22:55:12,670 fail2ban.comm [19891]: DEBUG Command: ['start', 'roundcube']
  275. 2016-02-25 22:55:12,670 fail2ban.jail [19891]: INFO Jail 'roundcube' started
  276. 2016-02-25 22:55:12,670 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] roundcube: started on `uname -n`
  277. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  278. From: Fail2Ban <fail2ban@localhost>
  279. To: info@gmail.com\n
  280. Hi,\n
  281. The jail roundcube has been started successfully.\n
  282. Regards,\n
  283. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com
  284. 2016-02-25 22:55:12,671 fail2ban.filter [19891]: DEBUG pyinotifier started for roundcube.
  285. 2016-02-25 22:55:12,671 fail2ban.comm [19891]: DEBUG Command: ['start', 'rainloop']
  286. 2016-02-25 22:55:12,672 fail2ban.filter [19891]: DEBUG pyinotifier started for rainloop.
  287. 2016-02-25 22:55:12,672 fail2ban.actions.action[19891]: DEBUG iptables -N fail2ban-rainloop
  288. iptables -A fail2ban-rainloop -j RETURN
  289. iptables -I INPUT -p tcp -m multiport --dports 8080,4443 -j fail2ban-rainloop
  290. 2016-02-25 22:55:12,672 fail2ban.jail [19891]: INFO Jail 'rainloop' started
  291. 2016-02-25 22:55:12,673 fail2ban.comm [19891]: DEBUG Command: ['start', 'imscp']
  292. 2016-02-25 22:55:12,673 fail2ban.jail [19891]: INFO Jail 'imscp' started
  293. 2016-02-25 22:55:12,673 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] imscp: started on `uname -n`
  294. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  295. From: Fail2Ban <fail2ban@localhost>
  296. To: info@gmail.com\n
  297. Hi,\n
  298. The jail imscp has been started successfully.\n
  299. Regards,\n
  300. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com
  301. 2016-02-25 22:55:12,674 fail2ban.filter [19891]: DEBUG pyinotifier started for imscp.
  302. 2016-02-25 22:55:12,685 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] SSH: started on `uname -n`
  303. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  304. From: Fail2Ban <fail2ban@localhost>
  305. To: info@gmail.com\n
  306. Hi,\n
  307. The jail SSH has been started successfully.\n
  308. Regards,\n
  309. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com returned successfully
  310. 2016-02-25 22:55:12,754 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] roundcube: started on `uname -n`
  311. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  312. From: Fail2Ban <fail2ban@localhost>
  313. To: info@gmail.com\n
  314. Hi,\n
  315. The jail roundcube has been started successfully.\n
  316. Regards,\n
  317. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com returned successfully
  318. 2016-02-25 22:55:12,760 fail2ban.actions.action[19891]: DEBUG iptables -N fail2ban-rainloop
  319. iptables -A fail2ban-rainloop -j RETURN
  320. iptables -I INPUT -p tcp -m multiport --dports 8080,4443 -j fail2ban-rainloop returned successfully
  321. 2016-02-25 22:55:12,778 fail2ban.actions.action[19891]: DEBUG printf %b "Subject: [Fail2Ban] imscp: started on `uname -n`
  322. Date: `LC_TIME=C date -u +"%a, %d %h %Y %T +0000"`
  323. From: Fail2Ban <fail2ban@localhost>
  324. To: info@gmail.com\n
  325. Hi,\n
  326. The jail imscp has been started successfully.\n
  327. Regards,\n
  328. Fail2Ban" | /usr/sbin/sendmail -f fail2ban@localhost info@gmail.com returned successfully
  329. 2016-02-25 22:55:47,229 fail2ban.comm [19891]: DEBUG Command: ['postfix']
  330. 2016-02-25 22:55:47,230 fail2ban.comm [19891]: WARNING Command ['postfix'] has failed. Received Exception('Invalid command',)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement