# failJSON: { "time": "2005-01-04T21:51:05", "match": true , "host": "127.0.0.1" } Jan 4 21:51:05 hostname cyrus/imap[5355]: badlogin: localhost.localdomain [127.0.0.1] plaintext cyrus@localdomain SASL(-13): authentication failure: checkpass failed # failJSON: { "time": "2005-02-20T17:23:32", "match": true , "host": "198.51.100.23" } Feb 20 17:23:32 domain cyrus/pop3[18635]: badlogin: localhost [198.51.100.23] plaintext administrator SASL(-13): authentication failure: checkpass failed # failJSON: { "time": "2005-02-20T17:23:32", "match": true , "host": "1.2.3.4" } Feb 20 17:23:32 cyrus/pop3[4297]: badlogin: example.com [1.2.3.4] plaintext mail0001 SASL(-13): authentication failure: checkpass failed # failJSON: { "time": "2005-06-08T18:11:13", "match": true , "host": "198.51.100.45" } Jun 8 18:11:13 lampserver imap[4480]: badlogin: example.com [198.51.100.45] DIGEST-MD5 [SASL(-13): authentication failure: client response doesn't match what we generated] # failJSON: { "time": "2004-12-21T10:01:57", "match": true , "host": "198.51.100.57" } Dec 21 10:01:57 hostname imapd[18454]: badlogin: example.com [198.51.100.57] CRAM-MD5 [SASL(-13): authentication failure: incorrect digest response] # failJSON: { "time": "2004-12-30T16:03:27", "match": true , "host": "1.2.3.4" } Dec 30 16:03:27 somehost imapd[2517]: badlogin: local-somehost[1.2.3.4] OTP [SASL(-13): authentication failure: External SSF not good enough]