I am using ssh access to manage address lists via linux scripts, everything works fine whoever in MikroTik logs i've got A LOT of lines where script was logged in.
Is there any way to ignore any login attempts with key or from specyfic IP?
Code: Select all
14:14:24 ssh,info publickey accepted for user: admin-ssh
14:14:24 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:24 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:14:30 ssh,info publickey accepted for user: admin-ssh
14:14:30 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:30 system,info address list entry added by admin-ssh
14:14:30 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:14:36 ssh,info publickey accepted for user: admin-ssh
14:14:36 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:36 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:14:43 ssh,info publickey accepted for user: admin-ssh
14:14:43 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:43 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:14:49 ssh,info publickey accepted for user: admin-ssh
14:14:49 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:49 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:14:56 ssh,info publickey accepted for user: admin-ssh
14:14:56 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:14:56 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:15:03 ssh,info publickey accepted for user: admin-ssh
14:15:03 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:15:03 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:15:10 ssh,info publickey accepted for user: admin-ssh
14:15:10 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:15:10 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:15:16 ssh,info publickey accepted for user: admin-ssh
14:15:16 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:15:16 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:15:24 ssh,info publickey accepted for user: admin-ssh
14:15:24 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:15:24 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
14:15:30 ssh,info publickey accepted for user: admin-ssh
14:15:30 system,info,account user admin-ssh logged in from 192.168.88.250 via ssh
14:15:30 system,info,account user admin-ssh logged out from 192.168.88.250 via ssh
Code: Select all
/system logging print
Flags: X - disabled, I - invalid, * - default
# TOPICS ACTION PREFIX
0 * info memory
1 * error memory
2 * warning memory
3 * critical echo
4 X debug remote
5 X ipsec memory
6 error remote
7 critical remote
8 ipsec remote
9 system remote