I use OSSEC HIDS to block brute force password attacks - and very good it is too. But recently I have been seeing a lot of attacks in the logs that have no IP address. Like this:
If there’s no IP address recorded, it was possibly a local authentication attempt. “user=ruby, service=smtp” sounds like it might be a web software on your machine that is trying a local login? Do you have anything in the Apache logs at that moment?
Yepp that’s right… Often you get several log entries, in different logs, for login (attempt) events, and the IP address is recorded in one or the other.