* freeswitch.service - freeswitch
Loaded: loaded (/lib/systemd/system/freeswitch.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Mon 2020-06-15 08:08:56 UTC; 35min ago
Process: 18034 ExecStartPre=/bin/mkdir -p /var/run/freeswitch (code=exited, status=214/SETSCHEDULER)
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Control process exited, code=exited status=214
Jun 15 08:08:56 CT100 systemd[1]: Failed to start freeswitch.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Unit entered failed state.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Failed with result 'exit-code'.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Service hold-off time over, scheduling restart.
Jun 15 08:08:56 CT100 systemd[1]: Stopped freeswitch.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Start request repeated too quickly.
Jun 15 08:08:56 CT100 systemd[1]: Failed to start freeswitch.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Unit entered failed state.
Jun 15 08:08:56 CT100 systemd[1]: freeswitch.service: Failed with result 'exit-code'.
Jun 15 08:43:21 CT100 sshd[19242]: Received disconnect from 49.88.112.76 port 34039:11: [preauth]
Jun 15 08:43:21 CT100 sshd[19242]: Disconnected from 49.88.112.76 port 34039 [preauth]
Jun 15 08:43:21 CT100 sshd[19242]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76
Jun 15 08:43:53 CT100 sshd[19260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
Jun 15 08:43:55 CT100 sshd[19260]: Failed password for root from 218.92.0.173 port 22922 ssh2
Jun 15 08:43:58 CT100 sshd[19260]: Failed password for root from 218.92.0.173 port 22922 ssh2
Jun 15 08:44:01 CT100 sshd[19260]: Failed password for root from 218.92.0.173 port 22922 ssh2
Jun 15 08:44:04 CT100 sshd[19260]: Failed password for root from 218.92.0.173 port 22922 ssh2
Jun 15 08:44:07 CT100 sshd[19260]: Failed password for root from 218.92.0.173 port 22922 ssh2
Jun 15 08:44:07 CT100 sshd[19260]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 22922 ssh2 [
Jun 15 08:44:07 CT100 sshd[19260]: Disconnecting: Too many authentication failures [preauth]
Jun 15 08:44:07 CT100 sshd[19260]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173
Jun 15 08:44:07 CT100 sshd[19260]: PAM service(sshd) ignoring max retries; 5 > 3
Jun 15 08:44:16 CT100 sshd[19273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
Jun 15 08:44:18 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:21 CT100 sshd[19277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.8
Jun 15 08:44:22 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:23 CT100 sshd[19277]: Failed password for root from 49.88.112.76 port 60386 ssh2
Jun 15 08:44:25 CT100 sshd[19277]: Failed password for root from 49.88.112.76 port 60386 ssh2
Jun 15 08:44:26 CT100 ntpd[1903]: local_clock: ntp_loopfilter.c line 818: ntp_adjtime: Operation not permitted
Jun 15 08:44:26 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:28 CT100 sshd[19277]: Failed password for root from 49.88.112.76 port 60386 ssh2
Jun 15 08:44:28 CT100 sshd[19277]: Received disconnect from 49.88.112.76 port 60386:11: [preauth]
Jun 15 08:44:28 CT100 sshd[19277]: Disconnected from 49.88.112.76 port 60386 [preauth]
Jun 15 08:44:28 CT100 sshd[19277]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76
Jun 15 08:44:29 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:34 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:37 CT100 sshd[19273]: Failed password for root from 218.92.0.173 port 61872 ssh2
Jun 15 08:44:37 CT100 sshd[19273]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 61872 ssh2 [
Jun 15 08:44:37 CT100 sshd[19273]: Disconnecting: Too many authentication failures [preauth]
Jun 15 08:44:37 CT100 sshd[19273]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173
Jun 15 08:44:37 CT100 sshd[19273]: PAM service(sshd) ignoring max retries; 6 > 3
Jun 15 08:44:44 CT100 sshd[19290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
Jun 15 08:44:46 CT100 sshd[19290]: Failed password for root from 218.92.0.173 port 31571 ssh2
Jun 15 08:44:47 CT100 sshd[19290]: Received disconnect from 218.92.0.173 port 31571:11: [preauth]
Jun 15 08:44:47 CT100 sshd[19290]: Disconnected from 218.92.0.173 port 31571 [preauth]
Jun 15 08:45:01 CT100 CRON[19301]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 15 08:45:01 CT100 CRON[19302]: (root) CMD (command -v debian-sa1 > /dev/null && debian-sa1 1 1)
Jun 15 08:45:01 CT100 CRON[19301]: pam_unix(cron:session): session closed for user root
lines 1114-1152/1152 (END)