Feb 22 18:29:57 ip-148-72-206-215 sshd[4602]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:29:57 ip-148-72-206-215 sshd[4602]: Disconnected from 91.224.92.190 port 60879 [preauth]
Feb 22 18:29:57 ip-148-72-206-215 sshd[4602]: Received disconnect from 91.224.92.190 port 60879:11: [preauth]
Feb 22 18:29:57 ip-148-72-206-215 sshd[4602]: Failed password for root from 91.224.92.190 port 60879 ssh2
Feb 22 18:29:55 ip-148-72-206-215 sshd[4602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:29:55 ip-148-72-206-215 sshd[4602]: Failed password for root from 91.224.92.190 port 60879 ssh2
Feb 22 18:29:52 ip-148-72-206-215 sshd[4602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:29:52 ip-148-72-206-215 sshd[4602]: Failed password for root from 91.224.92.190 port 60879 ssh2
Feb 22 18:29:50 ip-148-72-206-215 sshd[4602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:29:50 ip-148-72-206-215 sshd[4602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:29:49 ip-148-72-206-215 sshd[4602]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:24:50 ip-148-72-206-215 sshd[4322]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:24:50 ip-148-72-206-215 sshd[4322]: Disconnected from 91.224.92.190 port 63308 [preauth]
Feb 22 18:24:50 ip-148-72-206-215 sshd[4322]: Received disconnect from 91.224.92.190 port 63308:11: [preauth]
Feb 22 18:24:50 ip-148-72-206-215 sshd[4322]: Failed password for root from 91.224.92.190 port 63308 ssh2
Feb 22 18:24:48 ip-148-72-206-215 sshd[4322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:24:48 ip-148-72-206-215 sshd[4322]: Failed password for root from 91.224.92.190 port 63308 ssh2
Feb 22 18:24:46 ip-148-72-206-215 sshd[4322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:24:45 ip-148-72-206-215 sshd[4322]: Failed password for root from 91.224.92.190 port 63308 ssh2
Feb 22 18:24:43 ip-148-72-206-215 sshd[4322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:24:43 ip-148-72-206-215 sshd[4322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:24:43 ip-148-72-206-215 sshd[4322]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:17:19 ip-148-72-206-215 sshd[3861]: Connection closed by 188.166.42.31 port 37186 [preauth]
Feb 22 18:17:18 ip-148-72-206-215 sshd[3861]: Failed password for invalid user ansible from 188.166.42.31 port 37186 ssh2
Feb 22 18:17:16 ip-148-72-206-215 sshd[3861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:17:16 ip-148-72-206-215 sshd[3861]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:17:15 ip-148-72-206-215 sshd[3861]: input_userauth_request: invalid user ansible [preauth]
Feb 22 18:17:15 ip-148-72-206-215 sshd[3861]: Invalid user ansible from 188.166.42.31 port 37186
Feb 22 18:16:31 ip-148-72-206-215 sshd[3803]: Connection closed by 188.166.42.31 port 45940 [preauth]
Feb 22 18:16:30 ip-148-72-206-215 sshd[3803]: Failed password for invalid user ansible from 188.166.42.31 port 45940 ssh2
Feb 22 18:16:28 ip-148-72-206-215 sshd[3803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:16:28 ip-148-72-206-215 sshd[3803]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:16:28 ip-148-72-206-215 sshd[3803]: input_userauth_request: invalid user ansible [preauth]
Feb 22 18:16:28 ip-148-72-206-215 sshd[3803]: Invalid user ansible from 188.166.42.31 port 45940
Feb 22 18:15:41 ip-148-72-206-215 sshd[3755]: Connection closed by 188.166.42.31 port 34064 [preauth]
Feb 22 18:15:40 ip-148-72-206-215 sshd[3755]: Failed password for invalid user ansible from 188.166.42.31 port 34064 ssh2
Feb 22 18:15:38 ip-148-72-206-215 sshd[3755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:15:38 ip-148-72-206-215 sshd[3755]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:15:38 ip-148-72-206-215 sshd[3755]: input_userauth_request: invalid user ansible [preauth]
Feb 22 18:15:38 ip-148-72-206-215 sshd[3755]: Invalid user ansible from 188.166.42.31 port 34064
Feb 22 18:14:53 ip-148-72-206-215 sshd[3710]: Connection closed by 188.166.42.31 port 37434 [preauth]
Feb 22 18:14:53 ip-148-72-206-215 sshd[3710]: Failed password for invalid user ansible from 188.166.42.31 port 37434 ssh2
Feb 22 18:14:51 ip-148-72-206-215 sshd[3710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:14:51 ip-148-72-206-215 sshd[3710]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:14:50 ip-148-72-206-215 sshd[3710]: input_userauth_request: invalid user ansible [preauth]
Feb 22 18:14:50 ip-148-72-206-215 sshd[3710]: Invalid user ansible from 188.166.42.31 port 37434
Feb 22 18:14:03 ip-148-72-206-215 sshd[3660]: Connection closed by 188.166.42.31 port 33266 [preauth]
Feb 22 18:14:03 ip-148-72-206-215 sshd[3660]: Failed password for invalid user ansible from 188.166.42.31 port 33266 ssh2
Feb 22 18:14:01 ip-148-72-206-215 sshd[3660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:14:01 ip-148-72-206-215 sshd[3660]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:14:01 ip-148-72-206-215 sshd[3660]: input_userauth_request: invalid user ansible [preauth]
Feb 22 18:14:01 ip-148-72-206-215 sshd[3660]: Invalid user ansible from 188.166.42.31 port 33266
Feb 22 18:13:14 ip-148-72-206-215 sshd[3615]: Connection closed by 188.166.42.31 port 35434 [preauth]
Feb 22 18:13:14 ip-148-72-206-215 sshd[3615]: Failed password for invalid user administrator from 188.166.42.31 port 35434 ssh2
Feb 22 18:13:11 ip-148-72-206-215 sshd[3615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:13:11 ip-148-72-206-215 sshd[3615]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:13:11 ip-148-72-206-215 sshd[3615]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:13:11 ip-148-72-206-215 sshd[3615]: Invalid user administrator from 188.166.42.31 port 35434
Feb 22 18:12:25 ip-148-72-206-215 sshd[3553]: Connection closed by 188.166.42.31 port 38128 [preauth]
Feb 22 18:12:24 ip-148-72-206-215 sshd[3553]: Failed password for invalid user administrator from 188.166.42.31 port 38128 ssh2
Feb 22 18:12:22 ip-148-72-206-215 sshd[3553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:12:22 ip-148-72-206-215 sshd[3553]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:12:22 ip-148-72-206-215 sshd[3553]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:12:22 ip-148-72-206-215 sshd[3553]: Invalid user administrator from 188.166.42.31 port 38128
Feb 22 18:11:52 ip-148-72-206-215 sshd[3508]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 18:11:52 ip-148-72-206-215 sshd[3508]: Disconnected from 45.148.10.157 port 36930 [preauth]
Feb 22 18:11:52 ip-148-72-206-215 sshd[3508]: Received disconnect from 45.148.10.157 port 36930:11: [preauth]
Feb 22 18:11:52 ip-148-72-206-215 sshd[3508]: Failed password for root from 45.148.10.157 port 36930 ssh2
Feb 22 18:11:49 ip-148-72-206-215 sshd[3508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:11:49 ip-148-72-206-215 sshd[3508]: Failed password for root from 45.148.10.157 port 36930 ssh2
Feb 22 18:11:46 ip-148-72-206-215 sshd[3508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:11:46 ip-148-72-206-215 sshd[3508]: Failed password for root from 45.148.10.157 port 36930 ssh2
Feb 22 18:11:45 ip-148-72-206-215 sshd[3508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:11:45 ip-148-72-206-215 sshd[3508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 18:11:32 ip-148-72-206-215 sshd[3493]: Connection closed by 188.166.42.31 port 47746 [preauth]
Feb 22 18:11:32 ip-148-72-206-215 sshd[3493]: Failed password for invalid user administrator from 188.166.42.31 port 47746 ssh2
Feb 22 18:11:29 ip-148-72-206-215 sshd[3493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:11:29 ip-148-72-206-215 sshd[3493]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:11:29 ip-148-72-206-215 sshd[3493]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:11:29 ip-148-72-206-215 sshd[3493]: Invalid user administrator from 188.166.42.31 port 47746
Feb 22 18:10:40 ip-148-72-206-215 sshd[3448]: Connection closed by 188.166.42.31 port 58048 [preauth]
Feb 22 18:10:40 ip-148-72-206-215 sshd[3448]: Failed password for invalid user administrator from 188.166.42.31 port 58048 ssh2
Feb 22 18:10:38 ip-148-72-206-215 sshd[3448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:10:38 ip-148-72-206-215 sshd[3448]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:10:37 ip-148-72-206-215 sshd[3448]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:10:37 ip-148-72-206-215 sshd[3448]: Invalid user administrator from 188.166.42.31 port 58048
Feb 22 18:09:47 ip-148-72-206-215 sshd[3361]: Connection closed by 188.166.42.31 port 54972 [preauth]
Feb 22 18:09:47 ip-148-72-206-215 sshd[3361]: Failed password for invalid user administrator from 188.166.42.31 port 54972 ssh2
Feb 22 18:09:44 ip-148-72-206-215 sshd[3361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:09:44 ip-148-72-206-215 sshd[3361]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:09:44 ip-148-72-206-215 sshd[3361]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:09:44 ip-148-72-206-215 sshd[3361]: Invalid user administrator from 188.166.42.31 port 54972
Feb 22 18:08:56 ip-148-72-206-215 sshd[3301]: Connection closed by 188.166.42.31 port 56872 [preauth]
Feb 22 18:08:56 ip-148-72-206-215 sshd[3301]: Failed password for invalid user administrator from 188.166.42.31 port 56872 ssh2
Feb 22 18:08:55 ip-148-72-206-215 sshd[3301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:08:55 ip-148-72-206-215 sshd[3301]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:08:54 ip-148-72-206-215 sshd[3301]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:08:54 ip-148-72-206-215 sshd[3301]: Invalid user administrator from 188.166.42.31 port 56872
Feb 22 18:08:06 ip-148-72-206-215 sshd[3239]: Connection closed by 188.166.42.31 port 59374 [preauth]
Feb 22 18:08:06 ip-148-72-206-215 sshd[3239]: Failed password for invalid user administrator from 188.166.42.31 port 59374 ssh2
Feb 22 18:08:03 ip-148-72-206-215 sshd[3239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:08:03 ip-148-72-206-215 sshd[3239]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:08:03 ip-148-72-206-215 sshd[3239]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:08:03 ip-148-72-206-215 sshd[3239]: Invalid user administrator from 188.166.42.31 port 59374
Feb 22 18:07:13 ip-148-72-206-215 sshd[3187]: Connection closed by 188.166.42.31 port 56910 [preauth]
Feb 22 18:07:12 ip-148-72-206-215 sshd[3187]: Failed password for invalid user administrator from 188.166.42.31 port 56910 ssh2
Feb 22 18:07:11 ip-148-72-206-215 sshd[3187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:07:11 ip-148-72-206-215 sshd[3187]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:07:11 ip-148-72-206-215 sshd[3187]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:07:11 ip-148-72-206-215 sshd[3187]: Invalid user administrator from 188.166.42.31 port 56910
Feb 22 18:07:11 ip-148-72-206-215 sshd[3178]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 18:07:11 ip-148-72-206-215 sshd[3178]: Disconnected from 91.224.92.108 port 40024 [preauth]
Feb 22 18:07:11 ip-148-72-206-215 sshd[3178]: Received disconnect from 91.224.92.108 port 40024:11: [preauth]
Feb 22 18:07:10 ip-148-72-206-215 sshd[3178]: Failed password for root from 91.224.92.108 port 40024 ssh2
Feb 22 18:07:08 ip-148-72-206-215 sshd[3178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:07:08 ip-148-72-206-215 sshd[3178]: Failed password for root from 91.224.92.108 port 40024 ssh2
Feb 22 18:07:06 ip-148-72-206-215 sshd[3178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:07:05 ip-148-72-206-215 sshd[3178]: Failed password for root from 91.224.92.108 port 40024 ssh2
Feb 22 18:07:04 ip-148-72-206-215 sshd[3178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:07:04 ip-148-72-206-215 sshd[3178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 18:07:03 ip-148-72-206-215 sshd[3178]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:06:23 ip-148-72-206-215 sshd[3136]: Connection closed by 188.166.42.31 port 58834 [preauth]
Feb 22 18:06:23 ip-148-72-206-215 sshd[3136]: Failed password for invalid user administrator from 188.166.42.31 port 58834 ssh2
Feb 22 18:06:20 ip-148-72-206-215 sshd[3136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:06:20 ip-148-72-206-215 sshd[3136]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:06:20 ip-148-72-206-215 sshd[3136]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:06:20 ip-148-72-206-215 sshd[3136]: Invalid user administrator from 188.166.42.31 port 58834
Feb 22 18:05:32 ip-148-72-206-215 sshd[3081]: Connection closed by 188.166.42.31 port 58292 [preauth]
Feb 22 18:05:32 ip-148-72-206-215 sshd[3081]: Failed password for invalid user administrator from 188.166.42.31 port 58292 ssh2
Feb 22 18:05:30 ip-148-72-206-215 sshd[3081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:05:30 ip-148-72-206-215 sshd[3081]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:05:30 ip-148-72-206-215 sshd[3081]: input_userauth_request: invalid user administrator [preauth]
Feb 22 18:05:30 ip-148-72-206-215 sshd[3081]: Invalid user administrator from 188.166.42.31 port 58292
Feb 22 18:04:42 ip-148-72-206-215 sshd[3028]: Connection closed by 188.166.42.31 port 51534 [preauth]
Feb 22 18:04:42 ip-148-72-206-215 sshd[3028]: Failed password for invalid user admin from 188.166.42.31 port 51534 ssh2
Feb 22 18:04:39 ip-148-72-206-215 sshd[3028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:04:39 ip-148-72-206-215 sshd[3028]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:04:39 ip-148-72-206-215 sshd[3028]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:04:39 ip-148-72-206-215 sshd[3028]: Invalid user admin from 188.166.42.31 port 51534
Feb 22 18:03:48 ip-148-72-206-215 sshd[2969]: Connection closed by 188.166.42.31 port 39632 [preauth]
Feb 22 18:03:48 ip-148-72-206-215 sshd[2969]: Failed password for invalid user admin from 188.166.42.31 port 39632 ssh2
Feb 22 18:03:47 ip-148-72-206-215 sshd[2969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:03:47 ip-148-72-206-215 sshd[2969]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:03:46 ip-148-72-206-215 sshd[2969]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:03:46 ip-148-72-206-215 sshd[2969]: Invalid user admin from 188.166.42.31 port 39632
Feb 22 18:03:01 ip-148-72-206-215 sshd[2918]: Connection closed by 188.166.42.31 port 47568 [preauth]
Feb 22 18:03:01 ip-148-72-206-215 sshd[2918]: Failed password for invalid user admin from 188.166.42.31 port 47568 ssh2
Feb 22 18:02:58 ip-148-72-206-215 sshd[2918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:02:58 ip-148-72-206-215 sshd[2918]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:02:58 ip-148-72-206-215 sshd[2918]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:02:58 ip-148-72-206-215 sshd[2918]: Invalid user admin from 188.166.42.31 port 47568
Feb 22 18:02:44 ip-148-72-206-215 sshd[2894]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:02:44 ip-148-72-206-215 sshd[2894]: Disconnected from 91.224.92.190 port 29404 [preauth]
Feb 22 18:02:44 ip-148-72-206-215 sshd[2894]: Received disconnect from 91.224.92.190 port 29404:11: [preauth]
Feb 22 18:02:44 ip-148-72-206-215 sshd[2894]: Failed password for root from 91.224.92.190 port 29404 ssh2
Feb 22 18:02:42 ip-148-72-206-215 sshd[2894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:02:42 ip-148-72-206-215 sshd[2894]: Failed password for root from 91.224.92.190 port 29404 ssh2
Feb 22 18:02:40 ip-148-72-206-215 sshd[2894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:02:39 ip-148-72-206-215 sshd[2894]: Failed password for root from 91.224.92.190 port 29404 ssh2
Feb 22 18:02:37 ip-148-72-206-215 sshd[2894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 18:02:37 ip-148-72-206-215 sshd[2894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 18:02:37 ip-148-72-206-215 sshd[2894]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 18:02:15 ip-148-72-206-215 sshd[2872]: Connection closed by 188.166.42.31 port 36268 [preauth]
Feb 22 18:02:15 ip-148-72-206-215 sshd[2872]: Failed password for invalid user admin from 188.166.42.31 port 36268 ssh2
Feb 22 18:02:13 ip-148-72-206-215 sshd[2872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:02:13 ip-148-72-206-215 sshd[2872]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:02:12 ip-148-72-206-215 sshd[2872]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:02:12 ip-148-72-206-215 sshd[2872]: Invalid user admin from 188.166.42.31 port 36268
Feb 22 18:01:25 ip-148-72-206-215 sshd[2815]: Connection closed by 188.166.42.31 port 36384 [preauth]
Feb 22 18:01:25 ip-148-72-206-215 sshd[2815]: Failed password for invalid user admin from 188.166.42.31 port 36384 ssh2
Feb 22 18:01:23 ip-148-72-206-215 sshd[2815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:01:23 ip-148-72-206-215 sshd[2815]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:01:23 ip-148-72-206-215 sshd[2815]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:01:23 ip-148-72-206-215 sshd[2815]: Invalid user admin from 188.166.42.31 port 36384
Feb 22 18:00:33 ip-148-72-206-215 sshd[2750]: Connection closed by 188.166.42.31 port 41150 [preauth]
Feb 22 18:00:33 ip-148-72-206-215 sshd[2750]: Failed password for invalid user admin from 188.166.42.31 port 41150 ssh2
Feb 22 18:00:31 ip-148-72-206-215 sshd[2750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 18:00:31 ip-148-72-206-215 sshd[2750]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 18:00:30 ip-148-72-206-215 sshd[2750]: input_userauth_request: invalid user admin [preauth]
Feb 22 18:00:30 ip-148-72-206-215 sshd[2750]: Invalid user admin from 188.166.42.31 port 41150
Feb 22 17:59:36 ip-148-72-206-215 sshd[2672]: Connection closed by 188.166.42.31 port 38660 [preauth]
Feb 22 17:59:36 ip-148-72-206-215 sshd[2672]: Failed password for invalid user admin from 188.166.42.31 port 38660 ssh2
Feb 22 17:59:34 ip-148-72-206-215 sshd[2672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 17:59:34 ip-148-72-206-215 sshd[2672]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:59:34 ip-148-72-206-215 sshd[2672]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:59:34 ip-148-72-206-215 sshd[2672]: Invalid user admin from 188.166.42.31 port 38660
Feb 22 17:58:40 ip-148-72-206-215 sshd[2616]: Connection closed by 188.166.42.31 port 44572 [preauth]
Feb 22 17:58:40 ip-148-72-206-215 sshd[2616]: Failed password for invalid user admin from 188.166.42.31 port 44572 ssh2
Feb 22 17:58:37 ip-148-72-206-215 sshd[2616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 17:58:37 ip-148-72-206-215 sshd[2616]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:58:37 ip-148-72-206-215 sshd[2616]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:58:37 ip-148-72-206-215 sshd[2616]: Invalid user admin from 188.166.42.31 port 44572
Feb 22 17:58:10 ip-148-72-206-215 sshd[2577]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 17:58:10 ip-148-72-206-215 sshd[2577]: Disconnected from 91.224.92.190 port 27694 [preauth]
Feb 22 17:58:10 ip-148-72-206-215 sshd[2577]: Received disconnect from 91.224.92.190 port 27694:11: [preauth]
Feb 22 17:58:10 ip-148-72-206-215 sshd[2577]: Failed password for root from 91.224.92.190 port 27694 ssh2
Feb 22 17:58:07 ip-148-72-206-215 sshd[2577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:58:06 ip-148-72-206-215 sshd[2577]: Failed password for root from 91.224.92.190 port 27694 ssh2
Feb 22 17:58:04 ip-148-72-206-215 sshd[2577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:58:04 ip-148-72-206-215 sshd[2577]: Failed password for root from 91.224.92.190 port 27694 ssh2
Feb 22 17:58:02 ip-148-72-206-215 sshd[2577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:58:02 ip-148-72-206-215 sshd[2577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 17:58:01 ip-148-72-206-215 sshd[2577]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 17:57:41 ip-148-72-206-215 sshd[2558]: Connection closed by 188.166.42.31 port 58164 [preauth]
Feb 22 17:57:41 ip-148-72-206-215 sshd[2558]: Failed password for invalid user admin from 188.166.42.31 port 58164 ssh2
Feb 22 17:57:39 ip-148-72-206-215 sshd[2558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 17:57:39 ip-148-72-206-215 sshd[2558]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:57:39 ip-148-72-206-215 sshd[2558]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:57:39 ip-148-72-206-215 sshd[2558]: Invalid user admin from 188.166.42.31 port 58164
Feb 22 17:57:31 ip-148-72-206-215 sshd[2551]: Bad protocol version identification 'GET /favicon.ico HTTP/1.1' from 165.232.105.15 port 45046
Feb 22 17:57:30 ip-148-72-206-215 sshd[2550]: Bad protocol version identification 'GET / HTTP/1.1' from 165.232.105.15 port 45034
Feb 22 17:56:42 ip-148-72-206-215 sshd[2491]: Connection closed by 188.166.42.31 port 47744 [preauth]
Feb 22 17:56:42 ip-148-72-206-215 sshd[2491]: Failed password for invalid user admin from 188.166.42.31 port 47744 ssh2
Feb 22 17:56:40 ip-148-72-206-215 sshd[2491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.42.31
Feb 22 17:56:40 ip-148-72-206-215 sshd[2491]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:56:40 ip-148-72-206-215 sshd[2491]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:56:40 ip-148-72-206-215 sshd[2491]: Invalid user admin from 188.166.42.31 port 47744
Feb 22 17:55:49 ip-148-72-206-215 sshd[2445]: Did not receive identification string from 188.166.42.31 port 42922
Feb 22 17:43:07 ip-148-72-206-215 sshd[1723]: Connection closed by 87.236.176.130 port 40327 [preauth]
Feb 22 17:43:06 ip-148-72-206-215 sshd[1720]: Did not receive identification string from 87.236.176.130 port 47843
Feb 22 17:32:08 ip-148-72-206-215 sshd[1076]: Connection closed by 138.68.155.223 port 47476 [preauth]
Feb 22 17:32:07 ip-148-72-206-215 sshd[1076]: Failed password for invalid user admin from 138.68.155.223 port 47476 ssh2
Feb 22 17:32:05 ip-148-72-206-215 sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:32:05 ip-148-72-206-215 sshd[1076]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:32:04 ip-148-72-206-215 sshd[1076]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:32:04 ip-148-72-206-215 sshd[1076]: Invalid user admin from 138.68.155.223 port 47476
Feb 22 17:31:25 ip-148-72-206-215 sshd[1035]: Connection closed by 138.68.155.223 port 53628 [preauth]
Feb 22 17:31:25 ip-148-72-206-215 sshd[1035]: Failed password for invalid user admin from 138.68.155.223 port 53628 ssh2
Feb 22 17:31:23 ip-148-72-206-215 sshd[1035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:31:23 ip-148-72-206-215 sshd[1035]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:31:23 ip-148-72-206-215 sshd[1035]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:31:23 ip-148-72-206-215 sshd[1035]: Invalid user admin from 138.68.155.223 port 53628
Feb 22 17:30:43 ip-148-72-206-215 sshd[991]: Connection closed by 138.68.155.223 port 34904 [preauth]
Feb 22 17:30:42 ip-148-72-206-215 sshd[991]: Failed password for invalid user admin from 138.68.155.223 port 34904 ssh2
Feb 22 17:30:41 ip-148-72-206-215 sshd[991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:30:41 ip-148-72-206-215 sshd[991]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:30:40 ip-148-72-206-215 sshd[991]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:30:40 ip-148-72-206-215 sshd[991]: Invalid user admin from 138.68.155.223 port 34904
Feb 22 17:29:52 ip-148-72-206-215 sshd[923]: Connection closed by 138.68.155.223 port 46642 [preauth]
Feb 22 17:29:52 ip-148-72-206-215 sshd[923]: Failed password for invalid user admin from 138.68.155.223 port 46642 ssh2
Feb 22 17:29:50 ip-148-72-206-215 sshd[923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:29:50 ip-148-72-206-215 sshd[923]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:29:50 ip-148-72-206-215 sshd[923]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:29:50 ip-148-72-206-215 sshd[923]: Invalid user admin from 138.68.155.223 port 46642
Feb 22 17:29:08 ip-148-72-206-215 sshd[876]: Connection closed by 138.68.155.223 port 38710 [preauth]
Feb 22 17:29:08 ip-148-72-206-215 sshd[876]: Failed password for invalid user admin from 138.68.155.223 port 38710 ssh2
Feb 22 17:29:06 ip-148-72-206-215 sshd[876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:29:06 ip-148-72-206-215 sshd[876]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:29:05 ip-148-72-206-215 sshd[876]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:29:05 ip-148-72-206-215 sshd[876]: Invalid user admin from 138.68.155.223 port 38710
Feb 22 17:28:22 ip-148-72-206-215 sshd[831]: Connection closed by 138.68.155.223 port 40782 [preauth]
Feb 22 17:28:22 ip-148-72-206-215 sshd[831]: Failed password for invalid user admin from 138.68.155.223 port 40782 ssh2
Feb 22 17:28:19 ip-148-72-206-215 sshd[831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:28:19 ip-148-72-206-215 sshd[831]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:28:19 ip-148-72-206-215 sshd[831]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:28:19 ip-148-72-206-215 sshd[831]: Invalid user admin from 138.68.155.223 port 40782
Feb 22 17:27:34 ip-148-72-206-215 sshd[788]: Connection closed by 138.68.155.223 port 35316 [preauth]
Feb 22 17:27:34 ip-148-72-206-215 sshd[788]: Failed password for invalid user admin from 138.68.155.223 port 35316 ssh2
Feb 22 17:27:32 ip-148-72-206-215 sshd[788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223
Feb 22 17:27:32 ip-148-72-206-215 sshd[788]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 17:27:32 ip-148-72-206-215 sshd[788]: input_userauth_request: invalid user admin [preauth]
Feb 22 17:27:32 ip-148-72-206-215 sshd[788]: Invalid user admin from 138.68.155.223 port 35316
Feb 22 17:26:48 ip-148-72-206-215 sshd[741]: Connection closed by 138.68.155.223 port 52208 [preauth]
Feb 22 17:26:48 ip-148-72-206-215 sshd[741]: Failed password for root from 138.68.155.223 port 52208 ssh2
Feb 22 17:26:46 ip-148-72-206-215 sshd[741]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:26:46 ip-148-72-206-215 sshd[741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:26:03 ip-148-72-206-215 sshd[699]: Connection closed by 138.68.155.223 port 47898 [preauth]
Feb 22 17:26:03 ip-148-72-206-215 sshd[699]: Failed password for root from 138.68.155.223 port 47898 ssh2
Feb 22 17:26:01 ip-148-72-206-215 sshd[699]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:26:01 ip-148-72-206-215 sshd[699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:25:18 ip-148-72-206-215 sshd[645]: Connection closed by 138.68.155.223 port 35340 [preauth]
Feb 22 17:25:17 ip-148-72-206-215 sshd[645]: Failed password for root from 138.68.155.223 port 35340 ssh2
Feb 22 17:25:15 ip-148-72-206-215 sshd[645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:25:15 ip-148-72-206-215 sshd[645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:24:29 ip-148-72-206-215 sshd[592]: Connection closed by 138.68.155.223 port 35302 [preauth]
Feb 22 17:24:29 ip-148-72-206-215 sshd[592]: Failed password for root from 138.68.155.223 port 35302 ssh2
Feb 22 17:24:27 ip-148-72-206-215 sshd[592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:24:27 ip-148-72-206-215 sshd[592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:23:48 ip-148-72-206-215 sshd[533]: Connection closed by 138.68.155.223 port 44774 [preauth]
Feb 22 17:23:47 ip-148-72-206-215 sshd[533]: Failed password for root from 138.68.155.223 port 44774 ssh2
Feb 22 17:23:45 ip-148-72-206-215 sshd[533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:23:45 ip-148-72-206-215 sshd[533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:23:07 ip-148-72-206-215 sshd[488]: Connection closed by 138.68.155.223 port 54792 [preauth]
Feb 22 17:23:07 ip-148-72-206-215 sshd[488]: Failed password for root from 138.68.155.223 port 54792 ssh2
Feb 22 17:23:04 ip-148-72-206-215 sshd[488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:23:04 ip-148-72-206-215 sshd[488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:22:21 ip-148-72-206-215 sshd[437]: Connection closed by 138.68.155.223 port 35544 [preauth]
Feb 22 17:22:21 ip-148-72-206-215 sshd[437]: Failed password for root from 138.68.155.223 port 35544 ssh2
Feb 22 17:22:19 ip-148-72-206-215 sshd[437]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:22:19 ip-148-72-206-215 sshd[437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:21:32 ip-148-72-206-215 sshd[390]: Connection closed by 138.68.155.223 port 43606 [preauth]
Feb 22 17:21:32 ip-148-72-206-215 sshd[390]: Failed password for root from 138.68.155.223 port 43606 ssh2
Feb 22 17:21:30 ip-148-72-206-215 sshd[390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:21:30 ip-148-72-206-215 sshd[390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:20:46 ip-148-72-206-215 sshd[333]: Connection closed by 138.68.155.223 port 34784 [preauth]
Feb 22 17:20:46 ip-148-72-206-215 sshd[333]: Failed password for root from 138.68.155.223 port 34784 ssh2
Feb 22 17:20:44 ip-148-72-206-215 sshd[333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:20:44 ip-148-72-206-215 sshd[333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:19:56 ip-148-72-206-215 sshd[32737]: Connection closed by 138.68.155.223 port 42928 [preauth]
Feb 22 17:19:56 ip-148-72-206-215 sshd[32737]: Failed password for root from 138.68.155.223 port 42928 ssh2
Feb 22 17:19:54 ip-148-72-206-215 sshd[32737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:19:54 ip-148-72-206-215 sshd[32737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:19:11 ip-148-72-206-215 sshd[32686]: Connection closed by 138.68.155.223 port 58866 [preauth]
Feb 22 17:19:11 ip-148-72-206-215 sshd[32686]: Failed password for root from 138.68.155.223 port 58866 ssh2
Feb 22 17:19:09 ip-148-72-206-215 sshd[32686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:19:09 ip-148-72-206-215 sshd[32686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:18:26 ip-148-72-206-215 sshd[32638]: Connection closed by 138.68.155.223 port 37174 [preauth]
Feb 22 17:18:26 ip-148-72-206-215 sshd[32638]: Failed password for root from 138.68.155.223 port 37174 ssh2
Feb 22 17:18:24 ip-148-72-206-215 sshd[32638]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:18:24 ip-148-72-206-215 sshd[32638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:17:42 ip-148-72-206-215 sshd[32596]: Connection closed by 138.68.155.223 port 51354 [preauth]
Feb 22 17:17:41 ip-148-72-206-215 sshd[32596]: Failed password for root from 138.68.155.223 port 51354 ssh2
Feb 22 17:17:40 ip-148-72-206-215 sshd[32596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:17:40 ip-148-72-206-215 sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:16:53 ip-148-72-206-215 sshd[32524]: Connection closed by 138.68.155.223 port 52166 [preauth]
Feb 22 17:16:53 ip-148-72-206-215 sshd[32524]: Failed password for root from 138.68.155.223 port 52166 ssh2
Feb 22 17:16:51 ip-148-72-206-215 sshd[32524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:16:51 ip-148-72-206-215 sshd[32524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:16:07 ip-148-72-206-215 sshd[32468]: Connection closed by 138.68.155.223 port 57264 [preauth]
Feb 22 17:16:06 ip-148-72-206-215 sshd[32468]: Failed password for root from 138.68.155.223 port 57264 ssh2
Feb 22 17:16:04 ip-148-72-206-215 sshd[32468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:16:04 ip-148-72-206-215 sshd[32468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:15:11 ip-148-72-206-215 sshd[32383]: Connection closed by 138.68.155.223 port 46902 [preauth]
Feb 22 17:15:11 ip-148-72-206-215 sshd[32383]: Failed password for root from 138.68.155.223 port 46902 ssh2
Feb 22 17:15:09 ip-148-72-206-215 sshd[32383]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:15:09 ip-148-72-206-215 sshd[32383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:14:13 ip-148-72-206-215 sshd[32321]: Connection closed by 138.68.155.223 port 42830 [preauth]
Feb 22 17:14:13 ip-148-72-206-215 sshd[32321]: Failed password for root from 138.68.155.223 port 42830 ssh2
Feb 22 17:14:11 ip-148-72-206-215 sshd[32321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:14:11 ip-148-72-206-215 sshd[32321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:13:18 ip-148-72-206-215 sshd[32266]: Connection closed by 138.68.155.223 port 49632 [preauth]
Feb 22 17:13:18 ip-148-72-206-215 sshd[32266]: Failed password for root from 138.68.155.223 port 49632 ssh2
Feb 22 17:13:16 ip-148-72-206-215 sshd[32266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:13:16 ip-148-72-206-215 sshd[32266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:12:21 ip-148-72-206-215 sshd[32212]: Connection closed by 138.68.155.223 port 40970 [preauth]
Feb 22 17:12:21 ip-148-72-206-215 sshd[32212]: Failed password for root from 138.68.155.223 port 40970 ssh2
Feb 22 17:12:20 ip-148-72-206-215 sshd[32212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:12:20 ip-148-72-206-215 sshd[32212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:11:27 ip-148-72-206-215 sshd[32162]: Connection closed by 138.68.155.223 port 49782 [preauth]
Feb 22 17:11:26 ip-148-72-206-215 sshd[32162]: Failed password for root from 138.68.155.223 port 49782 ssh2
Feb 22 17:11:25 ip-148-72-206-215 sshd[32162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 17:11:25 ip-148-72-206-215 sshd[32162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.223 user=root
Feb 22 17:10:32 ip-148-72-206-215 sshd[32106]: Did not receive identification string from 138.68.155.223 port 47326
Feb 22 17:03:15 ip-148-72-206-215 sshd[31612]: Connection closed by 185.107.80.93 port 60852 [preauth]
Feb 22 16:05:16 ip-148-72-206-215 sshd[28169]: Connection closed by 171.231.189.2 port 47304 [preauth]
Feb 22 16:05:16 ip-148-72-206-215 sshd[28169]: Failed password for root from 171.231.189.2 port 47304 ssh2
Feb 22 16:05:14 ip-148-72-206-215 sshd[28169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 16:05:14 ip-148-72-206-215 sshd[28169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.189.2 user=root
Feb 22 16:05:00 ip-148-72-206-215 sshd[28182]: Connection closed by 171.231.189.2 port 47320 [preauth]
Feb 22 16:05:00 ip-148-72-206-215 sshd[28182]: Failed password for invalid user username from 171.231.189.2 port 47320 ssh2
Feb 22 16:04:58 ip-148-72-206-215 sshd[28182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.189.2
Feb 22 16:04:58 ip-148-72-206-215 sshd[28182]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 16:04:58 ip-148-72-206-215 sshd[28182]: input_userauth_request: invalid user username [preauth]
Feb 22 16:04:58 ip-148-72-206-215 sshd[28182]: Invalid user username from 171.231.189.2 port 47320
Feb 22 16:04:58 ip-148-72-206-215 sshd[28182]: Address 171.231.189.2 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 16:04:42 ip-148-72-206-215 sshd[28169]: Address 171.231.189.2 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:55:36 ip-148-72-206-215 sshd[27634]: Failed password for root from 64.227.171.207 port 35140 ssh2
Feb 22 15:55:34 ip-148-72-206-215 sshd[27634]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:55:34 ip-148-72-206-215 sshd[27634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:54:30 ip-148-72-206-215 sshd[27576]: Connection closed by 64.227.171.207 port 51160 [preauth]
Feb 22 15:54:30 ip-148-72-206-215 sshd[27576]: Failed password for root from 64.227.171.207 port 51160 ssh2
Feb 22 15:54:27 ip-148-72-206-215 sshd[27576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:54:27 ip-148-72-206-215 sshd[27576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:53:22 ip-148-72-206-215 sshd[27519]: Connection closed by 64.227.171.207 port 60414 [preauth]
Feb 22 15:53:22 ip-148-72-206-215 sshd[27519]: Failed password for root from 64.227.171.207 port 60414 ssh2
Feb 22 15:53:20 ip-148-72-206-215 sshd[27519]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:53:20 ip-148-72-206-215 sshd[27519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:52:09 ip-148-72-206-215 sshd[27455]: Connection closed by 64.227.171.207 port 59462 [preauth]
Feb 22 15:52:09 ip-148-72-206-215 sshd[27455]: Failed password for root from 64.227.171.207 port 59462 ssh2
Feb 22 15:52:07 ip-148-72-206-215 sshd[27455]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:52:07 ip-148-72-206-215 sshd[27455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:50:57 ip-148-72-206-215 sshd[27392]: Connection closed by 64.227.171.207 port 57174 [preauth]
Feb 22 15:50:57 ip-148-72-206-215 sshd[27392]: Failed password for root from 64.227.171.207 port 57174 ssh2
Feb 22 15:50:56 ip-148-72-206-215 sshd[27392]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:50:56 ip-148-72-206-215 sshd[27392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:49:47 ip-148-72-206-215 sshd[27314]: Connection closed by 64.227.171.207 port 60178 [preauth]
Feb 22 15:49:47 ip-148-72-206-215 sshd[27314]: Failed password for root from 64.227.171.207 port 60178 ssh2
Feb 22 15:49:45 ip-148-72-206-215 sshd[27314]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:49:45 ip-148-72-206-215 sshd[27314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:48:39 ip-148-72-206-215 sshd[27245]: Connection closed by 64.227.171.207 port 43302 [preauth]
Feb 22 15:48:39 ip-148-72-206-215 sshd[27245]: Failed password for root from 64.227.171.207 port 43302 ssh2
Feb 22 15:48:36 ip-148-72-206-215 sshd[27245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:48:36 ip-148-72-206-215 sshd[27245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:47:33 ip-148-72-206-215 sshd[27180]: Connection closed by 64.227.171.207 port 39904 [preauth]
Feb 22 15:47:32 ip-148-72-206-215 sshd[27180]: Failed password for root from 64.227.171.207 port 39904 ssh2
Feb 22 15:47:30 ip-148-72-206-215 sshd[27180]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:47:30 ip-148-72-206-215 sshd[27180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:47:10 ip-148-72-206-215 sshd[27160]: Connection closed by 64.226.126.121 port 53052 [preauth]
Feb 22 15:47:10 ip-148-72-206-215 sshd[27160]: Failed password for invalid user backup from 64.226.126.121 port 53052 ssh2
Feb 22 15:47:08 ip-148-72-206-215 sshd[27160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:47:08 ip-148-72-206-215 sshd[27160]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:47:07 ip-148-72-206-215 sshd[27160]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:47:07 ip-148-72-206-215 sshd[27160]: Invalid user backup from 64.226.126.121 port 53052
Feb 22 15:46:23 ip-148-72-206-215 sshd[27118]: Connection closed by 64.227.171.207 port 49566 [preauth]
Feb 22 15:46:23 ip-148-72-206-215 sshd[27118]: Failed password for root from 64.227.171.207 port 49566 ssh2
Feb 22 15:46:20 ip-148-72-206-215 sshd[27118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:46:20 ip-148-72-206-215 sshd[27118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:46:20 ip-148-72-206-215 sshd[27112]: Connection closed by 171.231.195.53 port 48554 [preauth]
Feb 22 15:46:19 ip-148-72-206-215 sshd[27112]: Failed password for invalid user admin from 171.231.195.53 port 48554 ssh2
Feb 22 15:46:17 ip-148-72-206-215 sshd[27112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:46:17 ip-148-72-206-215 sshd[27112]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:46:17 ip-148-72-206-215 sshd[27112]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:46:17 ip-148-72-206-215 sshd[27112]: Invalid user admin from 171.231.195.53 port 48554
Feb 22 15:46:17 ip-148-72-206-215 sshd[27112]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:46:14 ip-148-72-206-215 sshd[27107]: Connection closed by 64.226.126.121 port 42108 [preauth]
Feb 22 15:46:14 ip-148-72-206-215 sshd[27107]: Failed password for invalid user backup from 64.226.126.121 port 42108 ssh2
Feb 22 15:46:12 ip-148-72-206-215 sshd[27107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:46:12 ip-148-72-206-215 sshd[27107]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:46:12 ip-148-72-206-215 sshd[27107]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:46:12 ip-148-72-206-215 sshd[27107]: Invalid user backup from 64.226.126.121 port 42108
Feb 22 15:46:08 ip-148-72-206-215 sshd[27096]: Connection closed by 171.231.195.53 port 39994 [preauth]
Feb 22 15:46:07 ip-148-72-206-215 sshd[27096]: Failed password for invalid user admin from 171.231.195.53 port 39994 ssh2
Feb 22 15:46:05 ip-148-72-206-215 sshd[27096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:46:05 ip-148-72-206-215 sshd[27096]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:46:02 ip-148-72-206-215 sshd[27096]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:46:02 ip-148-72-206-215 sshd[27096]: Invalid user admin from 171.231.195.53 port 39994
Feb 22 15:46:02 ip-148-72-206-215 sshd[27096]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:45:19 ip-148-72-206-215 sshd[27058]: Connection closed by 64.226.126.121 port 50434 [preauth]
Feb 22 15:45:19 ip-148-72-206-215 sshd[27058]: Failed password for invalid user backup from 64.226.126.121 port 50434 ssh2
Feb 22 15:45:17 ip-148-72-206-215 sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:45:17 ip-148-72-206-215 sshd[27058]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:45:17 ip-148-72-206-215 sshd[27058]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:45:17 ip-148-72-206-215 sshd[27058]: Invalid user backup from 64.226.126.121 port 50434
Feb 22 15:45:11 ip-148-72-206-215 sshd[27044]: Connection closed by 64.227.171.207 port 36034 [preauth]
Feb 22 15:45:11 ip-148-72-206-215 sshd[27044]: Failed password for root from 64.227.171.207 port 36034 ssh2
Feb 22 15:45:09 ip-148-72-206-215 sshd[27044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:45:09 ip-148-72-206-215 sshd[27044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:44:20 ip-148-72-206-215 sshd[26998]: Connection closed by 64.226.126.121 port 59790 [preauth]
Feb 22 15:44:20 ip-148-72-206-215 sshd[26998]: Failed password for invalid user backup from 64.226.126.121 port 59790 ssh2
Feb 22 15:44:19 ip-148-72-206-215 sshd[26995]: Connection closed by 171.231.195.53 port 41618 [preauth]
Feb 22 15:44:19 ip-148-72-206-215 sshd[26995]: Failed password for invalid user admin from 171.231.195.53 port 41618 ssh2
Feb 22 15:44:18 ip-148-72-206-215 sshd[26998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:44:18 ip-148-72-206-215 sshd[26998]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:44:18 ip-148-72-206-215 sshd[26995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:44:18 ip-148-72-206-215 sshd[26995]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:44:18 ip-148-72-206-215 sshd[26995]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:44:18 ip-148-72-206-215 sshd[26995]: Invalid user admin from 171.231.195.53 port 41618
Feb 22 15:44:18 ip-148-72-206-215 sshd[26995]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:44:17 ip-148-72-206-215 sshd[26998]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:44:17 ip-148-72-206-215 sshd[26998]: Invalid user backup from 64.226.126.121 port 59790
Feb 22 15:44:02 ip-148-72-206-215 sshd[26980]: Connection closed by 64.227.171.207 port 46780 [preauth]
Feb 22 15:44:02 ip-148-72-206-215 sshd[26980]: Failed password for root from 64.227.171.207 port 46780 ssh2
Feb 22 15:44:00 ip-148-72-206-215 sshd[26980]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:44:00 ip-148-72-206-215 sshd[26980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:43:46 ip-148-72-206-215 sshd[26960]: Connection closed by 171.231.195.53 port 45792 [preauth]
Feb 22 15:43:44 ip-148-72-206-215 sshd[26960]: Failed password for invalid user test from 171.231.195.53 port 45792 ssh2
Feb 22 15:43:43 ip-148-72-206-215 sshd[26960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:43:43 ip-148-72-206-215 sshd[26960]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:43:43 ip-148-72-206-215 sshd[26960]: input_userauth_request: invalid user test [preauth]
Feb 22 15:43:43 ip-148-72-206-215 sshd[26960]: Invalid user test from 171.231.195.53 port 45792
Feb 22 15:43:43 ip-148-72-206-215 sshd[26960]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:43:20 ip-148-72-206-215 sshd[26936]: Connection closed by 64.226.126.121 port 42778 [preauth]
Feb 22 15:43:18 ip-148-72-206-215 sshd[26936]: Failed password for invalid user backup from 64.226.126.121 port 42778 ssh2
Feb 22 15:43:16 ip-148-72-206-215 sshd[26936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:43:16 ip-148-72-206-215 sshd[26936]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:43:15 ip-148-72-206-215 sshd[26936]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:43:15 ip-148-72-206-215 sshd[26936]: Invalid user backup from 64.226.126.121 port 42778
Feb 22 15:42:53 ip-148-72-206-215 sshd[26912]: Connection closed by 64.227.171.207 port 42114 [preauth]
Feb 22 15:42:53 ip-148-72-206-215 sshd[26912]: Failed password for root from 64.227.171.207 port 42114 ssh2
Feb 22 15:42:51 ip-148-72-206-215 sshd[26912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:42:51 ip-148-72-206-215 sshd[26912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:42:26 ip-148-72-206-215 sshd[26888]: Connection closed by 171.231.195.53 port 45658 [preauth]
Feb 22 15:42:26 ip-148-72-206-215 sshd[26888]: Failed password for invalid user admin from 171.231.195.53 port 45658 ssh2
Feb 22 15:42:24 ip-148-72-206-215 sshd[26888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:42:24 ip-148-72-206-215 sshd[26888]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:42:24 ip-148-72-206-215 sshd[26888]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:42:24 ip-148-72-206-215 sshd[26888]: Invalid user admin from 171.231.195.53 port 45658
Feb 22 15:42:24 ip-148-72-206-215 sshd[26888]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:42:15 ip-148-72-206-215 sshd[26869]: Connection closed by 64.226.126.121 port 41548 [preauth]
Feb 22 15:42:13 ip-148-72-206-215 sshd[26869]: Failed password for invalid user backup from 64.226.126.121 port 41548 ssh2
Feb 22 15:42:11 ip-148-72-206-215 sshd[26869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:42:11 ip-148-72-206-215 sshd[26869]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:42:11 ip-148-72-206-215 sshd[26869]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:42:11 ip-148-72-206-215 sshd[26869]: Invalid user backup from 64.226.126.121 port 41548
Feb 22 15:41:46 ip-148-72-206-215 sshd[26845]: Connection closed by 64.227.171.207 port 51136 [preauth]
Feb 22 15:41:46 ip-148-72-206-215 sshd[26845]: Failed password for root from 64.227.171.207 port 51136 ssh2
Feb 22 15:41:44 ip-148-72-206-215 sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:41:44 ip-148-72-206-215 sshd[26845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:41:43 ip-148-72-206-215 sshd[26813]: Connection closed by 171.231.195.53 port 56652 [preauth]
Feb 22 15:41:43 ip-148-72-206-215 sshd[26813]: Failed password for invalid user system from 171.231.195.53 port 56652 ssh2
Feb 22 15:41:41 ip-148-72-206-215 sshd[26813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:41:41 ip-148-72-206-215 sshd[26813]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:41:17 ip-148-72-206-215 sshd[26813]: input_userauth_request: invalid user system [preauth]
Feb 22 15:41:17 ip-148-72-206-215 sshd[26813]: Invalid user system from 171.231.195.53 port 56652
Feb 22 15:41:17 ip-148-72-206-215 sshd[26813]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:40:58 ip-148-72-206-215 sshd[26798]: Connection closed by 64.226.126.121 port 34656 [preauth]
Feb 22 15:40:58 ip-148-72-206-215 sshd[26798]: Failed password for invalid user backup from 64.226.126.121 port 34656 ssh2
Feb 22 15:40:56 ip-148-72-206-215 sshd[26798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:40:56 ip-148-72-206-215 sshd[26798]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:40:56 ip-148-72-206-215 sshd[26798]: input_userauth_request: invalid user backup [preauth]
Feb 22 15:40:56 ip-148-72-206-215 sshd[26798]: Invalid user backup from 64.226.126.121 port 34656
Feb 22 15:40:52 ip-148-72-206-215 sshd[26795]: Bad protocol version identification '\026\003\001' from 3.134.216.108 port 47694
Feb 22 15:40:36 ip-148-72-206-215 sshd[26776]: Connection closed by 64.227.171.207 port 40236 [preauth]
Feb 22 15:40:36 ip-148-72-206-215 sshd[26776]: Failed password for root from 64.227.171.207 port 40236 ssh2
Feb 22 15:40:34 ip-148-72-206-215 sshd[26776]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:40:34 ip-148-72-206-215 sshd[26776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:40:02 ip-148-72-206-215 sshd[26725]: Connection closed by 3.134.216.108 port 33188 [preauth]
Feb 22 15:39:55 ip-148-72-206-215 sshd[26722]: Connection closed by 64.226.126.121 port 58098 [preauth]
Feb 22 15:39:55 ip-148-72-206-215 sshd[26722]: Failed password for invalid user admin from 64.226.126.121 port 58098 ssh2
Feb 22 15:39:52 ip-148-72-206-215 sshd[26722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:39:52 ip-148-72-206-215 sshd[26722]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:39:52 ip-148-72-206-215 sshd[26722]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:39:52 ip-148-72-206-215 sshd[26722]: Invalid user admin from 64.226.126.121 port 58098
Feb 22 15:39:49 ip-148-72-206-215 sshd[26716]: Connection closed by 171.231.195.53 port 57398 [preauth]
Feb 22 15:39:49 ip-148-72-206-215 sshd[26716]: Failed password for invalid user guest from 171.231.195.53 port 57398 ssh2
Feb 22 15:39:47 ip-148-72-206-215 sshd[26716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:39:47 ip-148-72-206-215 sshd[26716]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:39:47 ip-148-72-206-215 sshd[26716]: input_userauth_request: invalid user guest [preauth]
Feb 22 15:39:47 ip-148-72-206-215 sshd[26716]: Invalid user guest from 171.231.195.53 port 57398
Feb 22 15:39:47 ip-148-72-206-215 sshd[26716]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:39:23 ip-148-72-206-215 sshd[26691]: Connection closed by 64.227.171.207 port 50714 [preauth]
Feb 22 15:39:23 ip-148-72-206-215 sshd[26691]: Failed password for root from 64.227.171.207 port 50714 ssh2
Feb 22 15:39:21 ip-148-72-206-215 sshd[26691]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:39:21 ip-148-72-206-215 sshd[26691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:39:09 ip-148-72-206-215 sshd[26597]: Connection closed by 171.231.195.53 port 38972 [preauth]
Feb 22 15:38:47 ip-148-72-206-215 sshd[26643]: Connection closed by 64.226.126.121 port 56382 [preauth]
Feb 22 15:38:46 ip-148-72-206-215 sshd[26643]: Failed password for invalid user admin from 64.226.126.121 port 56382 ssh2
Feb 22 15:38:44 ip-148-72-206-215 sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:38:44 ip-148-72-206-215 sshd[26643]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:38:44 ip-148-72-206-215 sshd[26643]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:38:44 ip-148-72-206-215 sshd[26643]: Invalid user admin from 64.226.126.121 port 56382
Feb 22 15:38:37 ip-148-72-206-215 sshd[26625]: Connection closed by 171.231.195.53 port 45126 [preauth]
Feb 22 15:38:36 ip-148-72-206-215 sshd[26625]: Failed password for root from 171.231.195.53 port 45126 ssh2
Feb 22 15:38:34 ip-148-72-206-215 sshd[26625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:38:34 ip-148-72-206-215 sshd[26625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53 user=root
Feb 22 15:38:33 ip-148-72-206-215 sshd[26625]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:38:31 ip-148-72-206-215 sshd[26597]: Failed password for root from 171.231.195.53 port 38972 ssh2
Feb 22 15:38:30 ip-148-72-206-215 sshd[26597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:38:30 ip-148-72-206-215 sshd[26597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53 user=root
Feb 22 15:38:29 ip-148-72-206-215 sshd[26597]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:38:12 ip-148-72-206-215 sshd[26603]: Connection closed by 64.227.171.207 port 46882 [preauth]
Feb 22 15:38:12 ip-148-72-206-215 sshd[26603]: Failed password for root from 64.227.171.207 port 46882 ssh2
Feb 22 15:38:10 ip-148-72-206-215 sshd[26603]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:38:10 ip-148-72-206-215 sshd[26603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:37:53 ip-148-72-206-215 sshd[26576]: Connection closed by 171.231.195.53 port 49022 [preauth]
Feb 22 15:37:53 ip-148-72-206-215 sshd[26576]: Failed password for invalid user admin from 171.231.195.53 port 49022 ssh2
Feb 22 15:37:51 ip-148-72-206-215 sshd[26576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:37:51 ip-148-72-206-215 sshd[26576]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:37:50 ip-148-72-206-215 sshd[26576]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:37:50 ip-148-72-206-215 sshd[26576]: Invalid user admin from 171.231.195.53 port 49022
Feb 22 15:37:50 ip-148-72-206-215 sshd[26576]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:37:44 ip-148-72-206-215 sshd[26569]: Connection closed by 64.226.126.121 port 40136 [preauth]
Feb 22 15:37:43 ip-148-72-206-215 sshd[26569]: Failed password for invalid user admin from 64.226.126.121 port 40136 ssh2
Feb 22 15:37:42 ip-148-72-206-215 sshd[26569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:37:42 ip-148-72-206-215 sshd[26569]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:37:41 ip-148-72-206-215 sshd[26569]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:37:41 ip-148-72-206-215 sshd[26569]: Invalid user admin from 64.226.126.121 port 40136
Feb 22 15:37:33 ip-148-72-206-215 sshd[26563]: Bad protocol version identification '\026\003\001' from 3.134.216.108 port 49932
Feb 22 15:36:58 ip-148-72-206-215 sshd[26528]: Connection closed by 64.227.171.207 port 49374 [preauth]
Feb 22 15:36:58 ip-148-72-206-215 sshd[26528]: Failed password for root from 64.227.171.207 port 49374 ssh2
Feb 22 15:36:56 ip-148-72-206-215 sshd[26528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:36:56 ip-148-72-206-215 sshd[26528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:36:41 ip-148-72-206-215 sshd[26509]: Connection closed by 64.226.126.121 port 40282 [preauth]
Feb 22 15:36:41 ip-148-72-206-215 sshd[26509]: Failed password for invalid user admin from 64.226.126.121 port 40282 ssh2
Feb 22 15:36:39 ip-148-72-206-215 sshd[26509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:36:39 ip-148-72-206-215 sshd[26509]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:36:39 ip-148-72-206-215 sshd[26509]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:36:39 ip-148-72-206-215 sshd[26509]: Invalid user admin from 64.226.126.121 port 40282
Feb 22 15:36:37 ip-148-72-206-215 sshd[26508]: Bad protocol version identification 'GET / HTTP/1.1' from 3.134.216.108 port 40598
Feb 22 15:35:44 ip-148-72-206-215 sshd[26453]: Connection closed by 64.227.171.207 port 45708 [preauth]
Feb 22 15:35:44 ip-148-72-206-215 sshd[26453]: Failed password for root from 64.227.171.207 port 45708 ssh2
Feb 22 15:35:42 ip-148-72-206-215 sshd[26453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:35:42 ip-148-72-206-215 sshd[26453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:35:42 ip-148-72-206-215 sshd[26446]: Connection closed by 64.226.126.121 port 39002 [preauth]
Feb 22 15:35:42 ip-148-72-206-215 sshd[26446]: Failed password for invalid user admin from 64.226.126.121 port 39002 ssh2
Feb 22 15:35:40 ip-148-72-206-215 sshd[26446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:35:40 ip-148-72-206-215 sshd[26446]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:35:40 ip-148-72-206-215 sshd[26446]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:35:40 ip-148-72-206-215 sshd[26446]: Invalid user admin from 64.226.126.121 port 39002
Feb 22 15:35:27 ip-148-72-206-215 sshd[26422]: Connection closed by 171.231.195.53 port 48170 [preauth]
Feb 22 15:35:27 ip-148-72-206-215 sshd[26422]: Failed password for root from 171.231.195.53 port 48170 ssh2
Feb 22 15:35:26 ip-148-72-206-215 sshd[26422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:35:26 ip-148-72-206-215 sshd[26422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53 user=root
Feb 22 15:35:25 ip-148-72-206-215 sshd[26422]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:35:01 ip-148-72-206-215 sshd[26411]: Bad protocol version identification '' from 3.134.216.108 port 55254
Feb 22 15:34:56 ip-148-72-206-215 sshd[26404]: Bad protocol version identification 'GET / HTTP/1.1' from 3.134.216.108 port 40510
Feb 22 15:34:43 ip-148-72-206-215 sshd[26383]: Connection closed by 64.226.126.121 port 39482 [preauth]
Feb 22 15:34:42 ip-148-72-206-215 sshd[26383]: Failed password for invalid user admin from 64.226.126.121 port 39482 ssh2
Feb 22 15:34:40 ip-148-72-206-215 sshd[26383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:34:40 ip-148-72-206-215 sshd[26383]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:34:40 ip-148-72-206-215 sshd[26383]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:34:40 ip-148-72-206-215 sshd[26383]: Invalid user admin from 64.226.126.121 port 39482
Feb 22 15:34:26 ip-148-72-206-215 sshd[26368]: Connection closed by 171.231.195.53 port 60210 [preauth]
Feb 22 15:34:25 ip-148-72-206-215 sshd[26368]: Failed password for invalid user support from 171.231.195.53 port 60210 ssh2
Feb 22 15:34:25 ip-148-72-206-215 sshd[26366]: Connection closed by 64.227.171.207 port 38486 [preauth]
Feb 22 15:34:25 ip-148-72-206-215 sshd[26366]: Failed password for root from 64.227.171.207 port 38486 ssh2
Feb 22 15:34:23 ip-148-72-206-215 sshd[26368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:34:23 ip-148-72-206-215 sshd[26368]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:34:23 ip-148-72-206-215 sshd[26368]: input_userauth_request: invalid user support [preauth]
Feb 22 15:34:23 ip-148-72-206-215 sshd[26368]: Invalid user support from 171.231.195.53 port 60210
Feb 22 15:34:23 ip-148-72-206-215 sshd[26368]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:34:23 ip-148-72-206-215 sshd[26366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:34:23 ip-148-72-206-215 sshd[26366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:33:43 ip-148-72-206-215 sshd[26323]: Connection closed by 64.226.126.121 port 33308 [preauth]
Feb 22 15:33:43 ip-148-72-206-215 sshd[26323]: Failed password for invalid user admin from 64.226.126.121 port 33308 ssh2
Feb 22 15:33:41 ip-148-72-206-215 sshd[26323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:33:41 ip-148-72-206-215 sshd[26323]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:33:41 ip-148-72-206-215 sshd[26323]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:33:41 ip-148-72-206-215 sshd[26323]: Invalid user admin from 64.226.126.121 port 33308
Feb 22 15:33:04 ip-148-72-206-215 sshd[26282]: Connection closed by 171.231.195.53 port 54936 [preauth]
Feb 22 15:33:03 ip-148-72-206-215 sshd[26282]: Failed password for invalid user squid from 171.231.195.53 port 54936 ssh2
Feb 22 15:33:01 ip-148-72-206-215 sshd[26282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:33:01 ip-148-72-206-215 sshd[26282]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:33:01 ip-148-72-206-215 sshd[26282]: input_userauth_request: invalid user squid [preauth]
Feb 22 15:33:01 ip-148-72-206-215 sshd[26282]: Invalid user squid from 171.231.195.53 port 54936
Feb 22 15:33:01 ip-148-72-206-215 sshd[26282]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:32:59 ip-148-72-206-215 sshd[26278]: Connection closed by 64.227.171.207 port 58954 [preauth]
Feb 22 15:32:59 ip-148-72-206-215 sshd[26278]: Failed password for root from 64.227.171.207 port 58954 ssh2
Feb 22 15:32:57 ip-148-72-206-215 sshd[26278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:32:57 ip-148-72-206-215 sshd[26278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.171.207 user=root
Feb 22 15:32:44 ip-148-72-206-215 sshd[26261]: Connection closed by 64.226.126.121 port 57302 [preauth]
Feb 22 15:32:44 ip-148-72-206-215 sshd[26261]: Failed password for invalid user admin from 64.226.126.121 port 57302 ssh2
Feb 22 15:32:41 ip-148-72-206-215 sshd[26261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:32:41 ip-148-72-206-215 sshd[26261]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:32:41 ip-148-72-206-215 sshd[26261]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:32:41 ip-148-72-206-215 sshd[26261]: Invalid user admin from 64.226.126.121 port 57302
Feb 22 15:32:13 ip-148-72-206-215 sshd[26235]: Connection closed by 171.231.195.53 port 46328 [preauth]
Feb 22 15:32:13 ip-148-72-206-215 sshd[26235]: Failed password for invalid user config from 171.231.195.53 port 46328 ssh2
Feb 22 15:32:12 ip-148-72-206-215 sshd[26235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:32:12 ip-148-72-206-215 sshd[26235]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:32:12 ip-148-72-206-215 sshd[26235]: input_userauth_request: invalid user config [preauth]
Feb 22 15:32:12 ip-148-72-206-215 sshd[26235]: Invalid user config from 171.231.195.53 port 46328
Feb 22 15:32:12 ip-148-72-206-215 sshd[26235]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:31:55 ip-148-72-206-215 sshd[26147]: Connection closed by 171.231.195.53 port 34298 [preauth]
Feb 22 15:31:55 ip-148-72-206-215 sshd[26147]: Failed password for invalid user ubnt from 171.231.195.53 port 34298 ssh2
Feb 22 15:31:54 ip-148-72-206-215 sshd[26147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:31:54 ip-148-72-206-215 sshd[26147]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:31:54 ip-148-72-206-215 sshd[26147]: input_userauth_request: invalid user ubnt [preauth]
Feb 22 15:31:54 ip-148-72-206-215 sshd[26147]: Invalid user ubnt from 171.231.195.53 port 34298
Feb 22 15:31:54 ip-148-72-206-215 sshd[26147]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:31:44 ip-148-72-206-215 sshd[26201]: Connection closed by 64.226.126.121 port 37794 [preauth]
Feb 22 15:31:44 ip-148-72-206-215 sshd[26201]: Failed password for invalid user admin from 64.226.126.121 port 37794 ssh2
Feb 22 15:31:41 ip-148-72-206-215 sshd[26201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:31:41 ip-148-72-206-215 sshd[26201]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:31:41 ip-148-72-206-215 sshd[26201]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:31:41 ip-148-72-206-215 sshd[26201]: Invalid user admin from 64.226.126.121 port 37794
Feb 22 15:31:29 ip-148-72-206-215 sshd[26084]: Connection closed by 171.231.195.53 port 56924 [preauth]
Feb 22 15:31:01 ip-148-72-206-215 sshd[26168]: Did not receive identification string from 64.227.171.207 port 60530
Feb 22 15:30:57 ip-148-72-206-215 sshd[26156]: Connection closed by 171.231.195.53 port 39866 [preauth]
Feb 22 15:30:56 ip-148-72-206-215 sshd[26156]: Failed password for invalid user user from 171.231.195.53 port 39866 ssh2
Feb 22 15:30:54 ip-148-72-206-215 sshd[26156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:30:54 ip-148-72-206-215 sshd[26156]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:30:54 ip-148-72-206-215 sshd[26156]: input_userauth_request: invalid user user [preauth]
Feb 22 15:30:54 ip-148-72-206-215 sshd[26156]: Invalid user user from 171.231.195.53 port 39866
Feb 22 15:30:54 ip-148-72-206-215 sshd[26156]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:30:35 ip-148-72-206-215 sshd[26133]: Connection closed by 64.226.126.121 port 53584 [preauth]
Feb 22 15:30:35 ip-148-72-206-215 sshd[26133]: Failed password for invalid user admin from 64.226.126.121 port 53584 ssh2
Feb 22 15:30:33 ip-148-72-206-215 sshd[26133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:30:33 ip-148-72-206-215 sshd[26133]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:30:33 ip-148-72-206-215 sshd[26133]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:30:33 ip-148-72-206-215 sshd[26133]: Invalid user admin from 64.226.126.121 port 53584
Feb 22 15:29:25 ip-148-72-206-215 sshd[26051]: Connection closed by 64.226.126.121 port 54290 [preauth]
Feb 22 15:29:25 ip-148-72-206-215 sshd[26051]: Failed password for invalid user admin from 64.226.126.121 port 54290 ssh2
Feb 22 15:29:23 ip-148-72-206-215 sshd[26051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:29:23 ip-148-72-206-215 sshd[26051]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:29:23 ip-148-72-206-215 sshd[26051]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:29:23 ip-148-72-206-215 sshd[26051]: Invalid user admin from 64.226.126.121 port 54290
Feb 22 15:28:41 ip-148-72-206-215 sshd[25986]: Connection closed by 171.231.195.53 port 34192 [preauth]
Feb 22 15:28:41 ip-148-72-206-215 sshd[25986]: Failed password for invalid user admin from 171.231.195.53 port 34192 ssh2
Feb 22 15:28:39 ip-148-72-206-215 sshd[25986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53
Feb 22 15:28:39 ip-148-72-206-215 sshd[25986]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:28:34 ip-148-72-206-215 sshd[25994]: Connection closed by 171.231.195.53 port 34212 [preauth]
Feb 22 15:28:33 ip-148-72-206-215 sshd[25986]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:28:33 ip-148-72-206-215 sshd[25986]: Invalid user admin from 171.231.195.53 port 34192
Feb 22 15:28:33 ip-148-72-206-215 sshd[25986]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:28:30 ip-148-72-206-215 sshd[25994]: Failed password for root from 171.231.195.53 port 34212 ssh2
Feb 22 15:28:29 ip-148-72-206-215 sshd[25994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 15:28:29 ip-148-72-206-215 sshd[25994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.195.53 user=root
Feb 22 15:28:29 ip-148-72-206-215 sshd[25994]: Address 171.231.195.53 maps to dynamic-ip-adsl.viettel.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 15:28:16 ip-148-72-206-215 sshd[25980]: Connection closed by 64.226.126.121 port 36100 [preauth]
Feb 22 15:28:15 ip-148-72-206-215 sshd[25980]: Failed password for invalid user admin from 64.226.126.121 port 36100 ssh2
Feb 22 15:28:14 ip-148-72-206-215 sshd[25980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:28:14 ip-148-72-206-215 sshd[25980]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:28:14 ip-148-72-206-215 sshd[25980]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:28:14 ip-148-72-206-215 sshd[25980]: Invalid user admin from 64.226.126.121 port 36100
Feb 22 15:27:00 ip-148-72-206-215 sshd[25890]: Connection closed by 64.226.126.121 port 37826 [preauth]
Feb 22 15:27:00 ip-148-72-206-215 sshd[25890]: Failed password for invalid user admin from 64.226.126.121 port 37826 ssh2
Feb 22 15:26:58 ip-148-72-206-215 sshd[25890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.226.126.121
Feb 22 15:26:58 ip-148-72-206-215 sshd[25890]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 15:26:58 ip-148-72-206-215 sshd[25890]: input_userauth_request: invalid user admin [preauth]
Feb 22 15:26:58 ip-148-72-206-215 sshd[25890]: Invalid user admin from 64.226.126.121 port 37826
Feb 22 15:25:24 ip-148-72-206-215 sshd[25808]: Did not receive identification string from 64.226.126.121 port 38138
Feb 22 12:38:38 ip-148-72-206-215 sshd[15744]: Connection reset by 205.210.31.242 port 57388 [preauth]
Feb 22 12:30:46 ip-148-72-206-215 sshd[15312]: Did not receive identification string from 45.79.207.111 port 50736
Feb 22 12:17:37 ip-148-72-206-215 sshd[14518]: Connection closed by 137.184.174.149 port 41132 [preauth]
Feb 22 12:17:21 ip-148-72-206-215 sshd[14505]: Connection closed by 139.59.178.225 port 53494 [preauth]
Feb 22 12:17:21 ip-148-72-206-215 sshd[14505]: Failed password for root from 139.59.178.225 port 53494 ssh2
Feb 22 12:17:19 ip-148-72-206-215 sshd[14505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:17:19 ip-148-72-206-215 sshd[14505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:16:19 ip-148-72-206-215 sshd[14445]: Connection closed by 139.59.178.225 port 36260 [preauth]
Feb 22 12:16:18 ip-148-72-206-215 sshd[14445]: Failed password for root from 139.59.178.225 port 36260 ssh2
Feb 22 12:16:16 ip-148-72-206-215 sshd[14445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:16:16 ip-148-72-206-215 sshd[14445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:15:11 ip-148-72-206-215 sshd[14371]: Connection closed by 139.59.178.225 port 48146 [preauth]
Feb 22 12:15:11 ip-148-72-206-215 sshd[14371]: Failed password for root from 139.59.178.225 port 48146 ssh2
Feb 22 12:15:09 ip-148-72-206-215 sshd[14371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:15:09 ip-148-72-206-215 sshd[14371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:14:03 ip-148-72-206-215 sshd[14312]: Connection closed by 139.59.178.225 port 56988 [preauth]
Feb 22 12:14:03 ip-148-72-206-215 sshd[14312]: Failed password for root from 139.59.178.225 port 56988 ssh2
Feb 22 12:14:01 ip-148-72-206-215 sshd[14312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:14:01 ip-148-72-206-215 sshd[14312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:13:01 ip-148-72-206-215 sshd[14253]: Connection closed by 139.59.178.225 port 52546 [preauth]
Feb 22 12:13:01 ip-148-72-206-215 sshd[14253]: Failed password for root from 139.59.178.225 port 52546 ssh2
Feb 22 12:12:59 ip-148-72-206-215 sshd[14253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:12:59 ip-148-72-206-215 sshd[14253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:11:44 ip-148-72-206-215 sshd[14163]: Connection closed by 139.59.178.225 port 49022 [preauth]
Feb 22 12:11:43 ip-148-72-206-215 sshd[14163]: Failed password for root from 139.59.178.225 port 49022 ssh2
Feb 22 12:11:42 ip-148-72-206-215 sshd[14163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:11:42 ip-148-72-206-215 sshd[14163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:10:36 ip-148-72-206-215 sshd[14101]: Connection closed by 139.59.178.225 port 43646 [preauth]
Feb 22 12:10:36 ip-148-72-206-215 sshd[14101]: Failed password for root from 139.59.178.225 port 43646 ssh2
Feb 22 12:10:35 ip-148-72-206-215 sshd[14101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:10:35 ip-148-72-206-215 sshd[14101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:09:27 ip-148-72-206-215 sshd[14031]: Connection closed by 139.59.178.225 port 46050 [preauth]
Feb 22 12:09:27 ip-148-72-206-215 sshd[14031]: Failed password for root from 139.59.178.225 port 46050 ssh2
Feb 22 12:09:25 ip-148-72-206-215 sshd[14031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:09:25 ip-148-72-206-215 sshd[14031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:08:25 ip-148-72-206-215 sshd[13955]: Connection closed by 139.59.178.225 port 44984 [preauth]
Feb 22 12:08:25 ip-148-72-206-215 sshd[13955]: Failed password for root from 139.59.178.225 port 44984 ssh2
Feb 22 12:08:22 ip-148-72-206-215 sshd[13955]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:08:22 ip-148-72-206-215 sshd[13955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:07:20 ip-148-72-206-215 sshd[13890]: Connection closed by 139.59.178.225 port 48538 [preauth]
Feb 22 12:07:20 ip-148-72-206-215 sshd[13890]: Failed password for root from 139.59.178.225 port 48538 ssh2
Feb 22 12:07:18 ip-148-72-206-215 sshd[13890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:07:18 ip-148-72-206-215 sshd[13890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:06:16 ip-148-72-206-215 sshd[13824]: Connection closed by 139.59.178.225 port 48298 [preauth]
Feb 22 12:06:16 ip-148-72-206-215 sshd[13824]: Failed password for root from 139.59.178.225 port 48298 ssh2
Feb 22 12:06:14 ip-148-72-206-215 sshd[13824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:06:14 ip-148-72-206-215 sshd[13824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:04:46 ip-148-72-206-215 sshd[13729]: Connection closed by 139.59.178.225 port 48146 [preauth]
Feb 22 12:04:46 ip-148-72-206-215 sshd[13729]: Failed password for root from 139.59.178.225 port 48146 ssh2
Feb 22 12:04:44 ip-148-72-206-215 sshd[13729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:04:44 ip-148-72-206-215 sshd[13729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:03:31 ip-148-72-206-215 sshd[13649]: Connection closed by 139.59.178.225 port 47274 [preauth]
Feb 22 12:03:30 ip-148-72-206-215 sshd[13649]: Failed password for root from 139.59.178.225 port 47274 ssh2
Feb 22 12:03:29 ip-148-72-206-215 sshd[13649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:03:29 ip-148-72-206-215 sshd[13649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:02:18 ip-148-72-206-215 sshd[13582]: Connection closed by 139.59.178.225 port 47336 [preauth]
Feb 22 12:02:17 ip-148-72-206-215 sshd[13582]: Failed password for root from 139.59.178.225 port 47336 ssh2
Feb 22 12:02:15 ip-148-72-206-215 sshd[13582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:02:15 ip-148-72-206-215 sshd[13582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 12:01:00 ip-148-72-206-215 sshd[13492]: Connection closed by 139.59.178.225 port 53664 [preauth]
Feb 22 12:00:59 ip-148-72-206-215 sshd[13492]: Failed password for root from 139.59.178.225 port 53664 ssh2
Feb 22 12:00:58 ip-148-72-206-215 sshd[13492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 12:00:58 ip-148-72-206-215 sshd[13492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 11:59:35 ip-148-72-206-215 sshd[13393]: Connection closed by 139.59.178.225 port 48010 [preauth]
Feb 22 11:59:35 ip-148-72-206-215 sshd[13393]: Failed password for root from 139.59.178.225 port 48010 ssh2
Feb 22 11:59:33 ip-148-72-206-215 sshd[13393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:59:33 ip-148-72-206-215 sshd[13393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.178.225 user=root
Feb 22 11:56:51 ip-148-72-206-215 sshd[13246]: Did not receive identification string from 139.59.178.225 port 43516
Feb 22 11:54:59 ip-148-72-206-215 sshd[13139]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 11:54:59 ip-148-72-206-215 sshd[13139]: Disconnected from 91.224.92.190 port 42122 [preauth]
Feb 22 11:54:59 ip-148-72-206-215 sshd[13139]: Received disconnect from 91.224.92.190 port 42122:11: [preauth]
Feb 22 11:54:59 ip-148-72-206-215 sshd[13139]: Failed password for root from 91.224.92.190 port 42122 ssh2
Feb 22 11:54:56 ip-148-72-206-215 sshd[13139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:54:56 ip-148-72-206-215 sshd[13139]: Failed password for root from 91.224.92.190 port 42122 ssh2
Feb 22 11:54:54 ip-148-72-206-215 sshd[13139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:54:54 ip-148-72-206-215 sshd[13139]: Failed password for root from 91.224.92.190 port 42122 ssh2
Feb 22 11:54:51 ip-148-72-206-215 sshd[13139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:54:51 ip-148-72-206-215 sshd[13139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 11:54:51 ip-148-72-206-215 sshd[13139]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 11:47:17 ip-148-72-206-215 sshd[12639]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 11:47:17 ip-148-72-206-215 sshd[12639]: Disconnected from 195.178.110.15 port 2448 [preauth]
Feb 22 11:47:17 ip-148-72-206-215 sshd[12639]: Received disconnect from 195.178.110.15 port 2448:11: [preauth]
Feb 22 11:47:17 ip-148-72-206-215 sshd[12639]: Failed password for root from 195.178.110.15 port 2448 ssh2
Feb 22 11:47:15 ip-148-72-206-215 sshd[12639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:47:15 ip-148-72-206-215 sshd[12639]: Failed password for root from 195.178.110.15 port 2448 ssh2
Feb 22 11:47:13 ip-148-72-206-215 sshd[12639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:47:13 ip-148-72-206-215 sshd[12639]: Failed password for root from 195.178.110.15 port 2448 ssh2
Feb 22 11:47:10 ip-148-72-206-215 sshd[12639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:47:10 ip-148-72-206-215 sshd[12639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 11:46:51 ip-148-72-206-215 sshd[12602]: Connection closed by 164.92.137.37 port 57648 [preauth]
Feb 22 11:46:51 ip-148-72-206-215 sshd[12602]: Failed password for invalid user jira from 164.92.137.37 port 57648 ssh2
Feb 22 11:46:49 ip-148-72-206-215 sshd[12602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:46:49 ip-148-72-206-215 sshd[12602]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:46:48 ip-148-72-206-215 sshd[12602]: input_userauth_request: invalid user jira [preauth]
Feb 22 11:46:48 ip-148-72-206-215 sshd[12602]: Invalid user jira from 164.92.137.37 port 57648
Feb 22 11:45:47 ip-148-72-206-215 sshd[12530]: Connection closed by 164.92.137.37 port 50122 [preauth]
Feb 22 11:45:46 ip-148-72-206-215 sshd[12530]: Failed password for invalid user wpyan from 164.92.137.37 port 50122 ssh2
Feb 22 11:45:44 ip-148-72-206-215 sshd[12530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:45:44 ip-148-72-206-215 sshd[12530]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:45:44 ip-148-72-206-215 sshd[12530]: input_userauth_request: invalid user wpyan [preauth]
Feb 22 11:45:44 ip-148-72-206-215 sshd[12530]: Invalid user wpyan from 164.92.137.37 port 50122
Feb 22 11:44:41 ip-148-72-206-215 sshd[12464]: Connection closed by 164.92.137.37 port 43880 [preauth]
Feb 22 11:44:41 ip-148-72-206-215 sshd[12464]: Failed password for invalid user user from 164.92.137.37 port 43880 ssh2
Feb 22 11:44:39 ip-148-72-206-215 sshd[12464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:44:39 ip-148-72-206-215 sshd[12464]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:44:39 ip-148-72-206-215 sshd[12464]: input_userauth_request: invalid user user [preauth]
Feb 22 11:44:39 ip-148-72-206-215 sshd[12464]: Invalid user user from 164.92.137.37 port 43880
Feb 22 11:44:06 ip-148-72-206-215 sshd[12424]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 11:44:06 ip-148-72-206-215 sshd[12424]: Disconnected from 45.148.10.151 port 19872 [preauth]
Feb 22 11:44:06 ip-148-72-206-215 sshd[12424]: Received disconnect from 45.148.10.151 port 19872:11: [preauth]
Feb 22 11:44:06 ip-148-72-206-215 sshd[12424]: Failed password for root from 45.148.10.151 port 19872 ssh2
Feb 22 11:44:04 ip-148-72-206-215 sshd[12424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:44:04 ip-148-72-206-215 sshd[12424]: Failed password for root from 45.148.10.151 port 19872 ssh2
Feb 22 11:44:03 ip-148-72-206-215 sshd[12424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:44:03 ip-148-72-206-215 sshd[12424]: Failed password for root from 45.148.10.151 port 19872 ssh2
Feb 22 11:44:01 ip-148-72-206-215 sshd[12424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:44:01 ip-148-72-206-215 sshd[12424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 11:43:34 ip-148-72-206-215 sshd[12397]: Connection closed by 164.92.137.37 port 45642 [preauth]
Feb 22 11:43:33 ip-148-72-206-215 sshd[12397]: Failed password for invalid user oracle from 164.92.137.37 port 45642 ssh2
Feb 22 11:43:31 ip-148-72-206-215 sshd[12397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:43:31 ip-148-72-206-215 sshd[12397]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:43:30 ip-148-72-206-215 sshd[12397]: input_userauth_request: invalid user oracle [preauth]
Feb 22 11:43:30 ip-148-72-206-215 sshd[12397]: Invalid user oracle from 164.92.137.37 port 45642
Feb 22 11:42:29 ip-148-72-206-215 sshd[12335]: Connection closed by 164.92.137.37 port 39256 [preauth]
Feb 22 11:42:29 ip-148-72-206-215 sshd[12335]: Failed password for invalid user postgres from 164.92.137.37 port 39256 ssh2
Feb 22 11:42:26 ip-148-72-206-215 sshd[12335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:42:26 ip-148-72-206-215 sshd[12335]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:42:26 ip-148-72-206-215 sshd[12335]: input_userauth_request: invalid user postgres [preauth]
Feb 22 11:42:26 ip-148-72-206-215 sshd[12335]: Invalid user postgres from 164.92.137.37 port 39256
Feb 22 11:41:25 ip-148-72-206-215 sshd[12276]: Connection closed by 164.92.137.37 port 50320 [preauth]
Feb 22 11:41:25 ip-148-72-206-215 sshd[12276]: Failed password for root from 164.92.137.37 port 50320 ssh2
Feb 22 11:41:23 ip-148-72-206-215 sshd[12276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:41:23 ip-148-72-206-215 sshd[12276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:40:20 ip-148-72-206-215 sshd[12213]: Connection closed by 164.92.137.37 port 50090 [preauth]
Feb 22 11:40:20 ip-148-72-206-215 sshd[12213]: Failed password for root from 164.92.137.37 port 50090 ssh2
Feb 22 11:40:18 ip-148-72-206-215 sshd[12213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:40:18 ip-148-72-206-215 sshd[12213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:39:17 ip-148-72-206-215 sshd[12137]: Connection closed by 164.92.137.37 port 48512 [preauth]
Feb 22 11:39:17 ip-148-72-206-215 sshd[12137]: Failed password for root from 164.92.137.37 port 48512 ssh2
Feb 22 11:39:14 ip-148-72-206-215 sshd[12137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:39:14 ip-148-72-206-215 sshd[12137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:38:11 ip-148-72-206-215 sshd[12070]: Connection closed by 164.92.137.37 port 53794 [preauth]
Feb 22 11:38:11 ip-148-72-206-215 sshd[12070]: Failed password for root from 164.92.137.37 port 53794 ssh2
Feb 22 11:38:08 ip-148-72-206-215 sshd[12070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:38:08 ip-148-72-206-215 sshd[12070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:37:48 ip-148-72-206-215 sshd[12043]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 11:37:48 ip-148-72-206-215 sshd[12043]: Disconnected from 195.178.110.15 port 34624 [preauth]
Feb 22 11:37:48 ip-148-72-206-215 sshd[12043]: Received disconnect from 195.178.110.15 port 34624:11: [preauth]
Feb 22 11:37:47 ip-148-72-206-215 sshd[12043]: Failed password for root from 195.178.110.15 port 34624 ssh2
Feb 22 11:37:46 ip-148-72-206-215 sshd[12043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:37:45 ip-148-72-206-215 sshd[12043]: Failed password for root from 195.178.110.15 port 34624 ssh2
Feb 22 11:37:43 ip-148-72-206-215 sshd[12043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:37:43 ip-148-72-206-215 sshd[12043]: Failed password for root from 195.178.110.15 port 34624 ssh2
Feb 22 11:37:40 ip-148-72-206-215 sshd[12043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:37:40 ip-148-72-206-215 sshd[12043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 11:37:03 ip-148-72-206-215 sshd[12007]: Connection closed by 164.92.137.37 port 48978 [preauth]
Feb 22 11:37:03 ip-148-72-206-215 sshd[12007]: Failed password for root from 164.92.137.37 port 48978 ssh2
Feb 22 11:37:01 ip-148-72-206-215 sshd[12007]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:37:01 ip-148-72-206-215 sshd[12007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:35:58 ip-148-72-206-215 sshd[11943]: Connection closed by 164.92.137.37 port 50594 [preauth]
Feb 22 11:35:58 ip-148-72-206-215 sshd[11943]: Failed password for root from 164.92.137.37 port 50594 ssh2
Feb 22 11:35:55 ip-148-72-206-215 sshd[11943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:35:55 ip-148-72-206-215 sshd[11943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:34:52 ip-148-72-206-215 sshd[11872]: Connection closed by 164.92.137.37 port 44914 [preauth]
Feb 22 11:34:51 ip-148-72-206-215 sshd[11872]: Failed password for root from 164.92.137.37 port 44914 ssh2
Feb 22 11:34:49 ip-148-72-206-215 sshd[11872]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:34:49 ip-148-72-206-215 sshd[11872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:33:43 ip-148-72-206-215 sshd[11806]: Connection closed by 164.92.137.37 port 41172 [preauth]
Feb 22 11:33:43 ip-148-72-206-215 sshd[11806]: Failed password for root from 164.92.137.37 port 41172 ssh2
Feb 22 11:33:41 ip-148-72-206-215 sshd[11806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:33:41 ip-148-72-206-215 sshd[11806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37 user=root
Feb 22 11:32:28 ip-148-72-206-215 sshd[11738]: Connection closed by 164.92.137.37 port 49260 [preauth]
Feb 22 11:32:28 ip-148-72-206-215 sshd[11738]: Failed password for invalid user test3 from 164.92.137.37 port 49260 ssh2
Feb 22 11:32:26 ip-148-72-206-215 sshd[11738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:32:26 ip-148-72-206-215 sshd[11738]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:32:26 ip-148-72-206-215 sshd[11738]: input_userauth_request: invalid user test3 [preauth]
Feb 22 11:32:26 ip-148-72-206-215 sshd[11738]: Invalid user test3 from 164.92.137.37 port 49260
Feb 22 11:31:11 ip-148-72-206-215 sshd[11662]: Connection closed by 164.92.137.37 port 44034 [preauth]
Feb 22 11:31:11 ip-148-72-206-215 sshd[11662]: Failed password for invalid user test2 from 164.92.137.37 port 44034 ssh2
Feb 22 11:31:09 ip-148-72-206-215 sshd[11662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:31:09 ip-148-72-206-215 sshd[11662]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:31:09 ip-148-72-206-215 sshd[11662]: input_userauth_request: invalid user test2 [preauth]
Feb 22 11:31:09 ip-148-72-206-215 sshd[11662]: Invalid user test2 from 164.92.137.37 port 44034
Feb 22 11:30:54 ip-148-72-206-215 sshd[11648]: Bad protocol version identification '\026\003\001' from 64.62.197.167 port 22746
Feb 22 11:30:44 ip-148-72-206-215 sshd[11616]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 11:30:44 ip-148-72-206-215 sshd[11616]: Disconnected from 45.148.10.157 port 39264 [preauth]
Feb 22 11:30:44 ip-148-72-206-215 sshd[11616]: Received disconnect from 45.148.10.157 port 39264:11: [preauth]
Feb 22 11:30:44 ip-148-72-206-215 sshd[11616]: Failed password for root from 45.148.10.157 port 39264 ssh2
Feb 22 11:30:42 ip-148-72-206-215 sshd[11616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:30:42 ip-148-72-206-215 sshd[11616]: Failed password for root from 45.148.10.157 port 39264 ssh2
Feb 22 11:30:39 ip-148-72-206-215 sshd[11616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:30:39 ip-148-72-206-215 sshd[11616]: Failed password for root from 45.148.10.157 port 39264 ssh2
Feb 22 11:30:37 ip-148-72-206-215 sshd[11616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:30:37 ip-148-72-206-215 sshd[11616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 11:29:54 ip-148-72-206-215 sshd[11557]: Connection closed by 164.92.137.37 port 34316 [preauth]
Feb 22 11:29:54 ip-148-72-206-215 sshd[11557]: Failed password for invalid user test1 from 164.92.137.37 port 34316 ssh2
Feb 22 11:29:51 ip-148-72-206-215 sshd[11557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.137.37
Feb 22 11:29:51 ip-148-72-206-215 sshd[11557]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 11:29:51 ip-148-72-206-215 sshd[11557]: input_userauth_request: invalid user test1 [preauth]
Feb 22 11:29:51 ip-148-72-206-215 sshd[11557]: Invalid user test1 from 164.92.137.37 port 34316
Feb 22 11:27:40 ip-148-72-206-215 sshd[11427]: Did not receive identification string from 164.92.137.37 port 42568
Feb 22 11:23:45 ip-148-72-206-215 sshd[11187]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 11:23:45 ip-148-72-206-215 sshd[11187]: Disconnected from 45.148.10.157 port 10660 [preauth]
Feb 22 11:23:45 ip-148-72-206-215 sshd[11187]: Received disconnect from 45.148.10.157 port 10660:11: [preauth]
Feb 22 11:23:45 ip-148-72-206-215 sshd[11187]: Failed password for root from 45.148.10.157 port 10660 ssh2
Feb 22 11:23:43 ip-148-72-206-215 sshd[11187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:23:42 ip-148-72-206-215 sshd[11187]: Failed password for root from 45.148.10.157 port 10660 ssh2
Feb 22 11:23:40 ip-148-72-206-215 sshd[11187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:23:39 ip-148-72-206-215 sshd[11187]: Failed password for root from 45.148.10.157 port 10660 ssh2
Feb 22 11:23:37 ip-148-72-206-215 sshd[11187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:23:37 ip-148-72-206-215 sshd[11187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 11:16:49 ip-148-72-206-215 sshd[10778]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 11:16:49 ip-148-72-206-215 sshd[10778]: Disconnected from 45.148.10.147 port 17132 [preauth]
Feb 22 11:16:49 ip-148-72-206-215 sshd[10778]: Received disconnect from 45.148.10.147 port 17132:11: [preauth]
Feb 22 11:16:49 ip-148-72-206-215 sshd[10778]: Failed password for root from 45.148.10.147 port 17132 ssh2
Feb 22 11:16:48 ip-148-72-206-215 sshd[10778]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:16:47 ip-148-72-206-215 sshd[10778]: Failed password for root from 45.148.10.147 port 17132 ssh2
Feb 22 11:16:45 ip-148-72-206-215 sshd[10778]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:16:45 ip-148-72-206-215 sshd[10778]: Failed password for root from 45.148.10.147 port 17132 ssh2
Feb 22 11:16:43 ip-148-72-206-215 sshd[10778]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:16:43 ip-148-72-206-215 sshd[10778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 11:09:55 ip-148-72-206-215 sshd[10303]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 11:09:55 ip-148-72-206-215 sshd[10303]: Disconnected from 91.224.92.108 port 40784 [preauth]
Feb 22 11:09:55 ip-148-72-206-215 sshd[10303]: Received disconnect from 91.224.92.108 port 40784:11: [preauth]
Feb 22 11:09:54 ip-148-72-206-215 sshd[10303]: Failed password for root from 91.224.92.108 port 40784 ssh2
Feb 22 11:09:52 ip-148-72-206-215 sshd[10303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:09:52 ip-148-72-206-215 sshd[10303]: Failed password for root from 91.224.92.108 port 40784 ssh2
Feb 22 11:09:51 ip-148-72-206-215 sshd[10303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:09:50 ip-148-72-206-215 sshd[10303]: Failed password for root from 91.224.92.108 port 40784 ssh2
Feb 22 11:09:48 ip-148-72-206-215 sshd[10303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:09:48 ip-148-72-206-215 sshd[10303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 11:09:48 ip-148-72-206-215 sshd[10303]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 11:02:57 ip-148-72-206-215 sshd[9895]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 11:02:57 ip-148-72-206-215 sshd[9895]: Disconnected from 45.148.10.152 port 33206 [preauth]
Feb 22 11:02:57 ip-148-72-206-215 sshd[9895]: Received disconnect from 45.148.10.152 port 33206:11: [preauth]
Feb 22 11:02:56 ip-148-72-206-215 sshd[9895]: Failed password for root from 45.148.10.152 port 33206 ssh2
Feb 22 11:02:54 ip-148-72-206-215 sshd[9895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:02:54 ip-148-72-206-215 sshd[9895]: Failed password for root from 45.148.10.152 port 33206 ssh2
Feb 22 11:02:52 ip-148-72-206-215 sshd[9895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:02:52 ip-148-72-206-215 sshd[9895]: Failed password for root from 45.148.10.152 port 33206 ssh2
Feb 22 11:02:50 ip-148-72-206-215 sshd[9895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 11:02:50 ip-148-72-206-215 sshd[9895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 10:56:38 ip-148-72-206-215 sshd[9522]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 10:56:38 ip-148-72-206-215 sshd[9522]: Disconnected from 45.148.10.151 port 28499 [preauth]
Feb 22 10:56:38 ip-148-72-206-215 sshd[9522]: Received disconnect from 45.148.10.151 port 28499:11: [preauth]
Feb 22 10:56:38 ip-148-72-206-215 sshd[9522]: Failed password for root from 45.148.10.151 port 28499 ssh2
Feb 22 10:56:36 ip-148-72-206-215 sshd[9522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:56:36 ip-148-72-206-215 sshd[9522]: Failed password for root from 45.148.10.151 port 28499 ssh2
Feb 22 10:56:34 ip-148-72-206-215 sshd[9522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:56:33 ip-148-72-206-215 sshd[9522]: Failed password for root from 45.148.10.151 port 28499 ssh2
Feb 22 10:56:32 ip-148-72-206-215 sshd[9522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:56:32 ip-148-72-206-215 sshd[9522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 10:49:54 ip-148-72-206-215 sshd[9123]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 10:49:54 ip-148-72-206-215 sshd[9123]: Disconnected from 45.148.10.141 port 48770 [preauth]
Feb 22 10:49:54 ip-148-72-206-215 sshd[9123]: Received disconnect from 45.148.10.141 port 48770:11: [preauth]
Feb 22 10:49:53 ip-148-72-206-215 sshd[9123]: Failed password for root from 45.148.10.141 port 48770 ssh2
Feb 22 10:49:51 ip-148-72-206-215 sshd[9123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:49:51 ip-148-72-206-215 sshd[9123]: Failed password for root from 45.148.10.141 port 48770 ssh2
Feb 22 10:49:49 ip-148-72-206-215 sshd[9123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:49:48 ip-148-72-206-215 sshd[9123]: Failed password for root from 45.148.10.141 port 48770 ssh2
Feb 22 10:49:46 ip-148-72-206-215 sshd[9123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:49:46 ip-148-72-206-215 sshd[9123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 10:43:03 ip-148-72-206-215 sshd[8756]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 10:43:03 ip-148-72-206-215 sshd[8756]: Disconnected from 45.148.10.141 port 6318 [preauth]
Feb 22 10:43:03 ip-148-72-206-215 sshd[8756]: Received disconnect from 45.148.10.141 port 6318:11: [preauth]
Feb 22 10:43:03 ip-148-72-206-215 sshd[8756]: Failed password for root from 45.148.10.141 port 6318 ssh2
Feb 22 10:43:01 ip-148-72-206-215 sshd[8756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:43:01 ip-148-72-206-215 sshd[8756]: Failed password for root from 45.148.10.141 port 6318 ssh2
Feb 22 10:42:59 ip-148-72-206-215 sshd[8756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:42:59 ip-148-72-206-215 sshd[8756]: Failed password for root from 45.148.10.141 port 6318 ssh2
Feb 22 10:42:57 ip-148-72-206-215 sshd[8756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:42:57 ip-148-72-206-215 sshd[8756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 10:41:23 ip-148-72-206-215 sshd[8668]: Connection closed by 64.62.197.75 port 18219 [preauth]
Feb 22 10:41:20 ip-148-72-206-215 sshd[8668]: input_userauth_request: invalid user [preauth]
Feb 22 10:41:20 ip-148-72-206-215 sshd[8668]: Invalid user from 64.62.197.75 port 18219
Feb 22 10:36:12 ip-148-72-206-215 sshd[8353]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 10:36:12 ip-148-72-206-215 sshd[8353]: Disconnected from 91.224.92.108 port 51556 [preauth]
Feb 22 10:36:12 ip-148-72-206-215 sshd[8353]: Received disconnect from 91.224.92.108 port 51556:11: [preauth]
Feb 22 10:36:12 ip-148-72-206-215 sshd[8353]: Failed password for root from 91.224.92.108 port 51556 ssh2
Feb 22 10:36:11 ip-148-72-206-215 sshd[8353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:36:11 ip-148-72-206-215 sshd[8353]: Failed password for root from 91.224.92.108 port 51556 ssh2
Feb 22 10:36:08 ip-148-72-206-215 sshd[8353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:36:08 ip-148-72-206-215 sshd[8353]: Failed password for root from 91.224.92.108 port 51556 ssh2
Feb 22 10:36:06 ip-148-72-206-215 sshd[8353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:36:06 ip-148-72-206-215 sshd[8353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 10:36:06 ip-148-72-206-215 sshd[8353]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 10:30:02 ip-148-72-206-215 sshd[7958]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 10:30:02 ip-148-72-206-215 sshd[7958]: Disconnected from 45.148.10.147 port 58638 [preauth]
Feb 22 10:30:02 ip-148-72-206-215 sshd[7958]: Received disconnect from 45.148.10.147 port 58638:11: [preauth]
Feb 22 10:30:02 ip-148-72-206-215 sshd[7958]: Failed password for root from 45.148.10.147 port 58638 ssh2
Feb 22 10:30:00 ip-148-72-206-215 sshd[7958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:30:00 ip-148-72-206-215 sshd[7958]: Failed password for root from 45.148.10.147 port 58638 ssh2
Feb 22 10:29:58 ip-148-72-206-215 sshd[7958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:29:58 ip-148-72-206-215 sshd[7958]: Failed password for root from 45.148.10.147 port 58638 ssh2
Feb 22 10:29:56 ip-148-72-206-215 sshd[7958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:29:56 ip-148-72-206-215 sshd[7958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 10:23:31 ip-148-72-206-215 sshd[7567]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Feb 22 10:23:31 ip-148-72-206-215 sshd[7567]: Disconnected from 91.224.92.54 port 1576 [preauth]
Feb 22 10:23:31 ip-148-72-206-215 sshd[7567]: Received disconnect from 91.224.92.54 port 1576:11: [preauth]
Feb 22 10:23:31 ip-148-72-206-215 sshd[7567]: Failed password for root from 91.224.92.54 port 1576 ssh2
Feb 22 10:23:29 ip-148-72-206-215 sshd[7567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:23:29 ip-148-72-206-215 sshd[7567]: Failed password for root from 91.224.92.54 port 1576 ssh2
Feb 22 10:23:27 ip-148-72-206-215 sshd[7567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:23:27 ip-148-72-206-215 sshd[7567]: Failed password for root from 91.224.92.54 port 1576 ssh2
Feb 22 10:23:25 ip-148-72-206-215 sshd[7567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:23:25 ip-148-72-206-215 sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Feb 22 10:23:25 ip-148-72-206-215 sshd[7567]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 10:16:47 ip-148-72-206-215 sshd[7150]: Disconnected from 45.148.10.141 port 42238 [preauth]
Feb 22 10:16:47 ip-148-72-206-215 sshd[7150]: Received disconnect from 45.148.10.141 port 42238:11: [preauth]
Feb 22 10:09:56 ip-148-72-206-215 sshd[6728]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 10:09:56 ip-148-72-206-215 sshd[6728]: Disconnected from 91.224.92.108 port 38590 [preauth]
Feb 22 10:09:56 ip-148-72-206-215 sshd[6728]: Received disconnect from 91.224.92.108 port 38590:11: [preauth]
Feb 22 10:09:56 ip-148-72-206-215 sshd[6728]: Failed password for root from 91.224.92.108 port 38590 ssh2
Feb 22 10:09:54 ip-148-72-206-215 sshd[6728]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:09:54 ip-148-72-206-215 sshd[6728]: Failed password for root from 91.224.92.108 port 38590 ssh2
Feb 22 10:09:52 ip-148-72-206-215 sshd[6728]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:09:51 ip-148-72-206-215 sshd[6728]: Failed password for root from 91.224.92.108 port 38590 ssh2
Feb 22 10:09:49 ip-148-72-206-215 sshd[6728]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:09:49 ip-148-72-206-215 sshd[6728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 10:09:49 ip-148-72-206-215 sshd[6728]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 10:03:15 ip-148-72-206-215 sshd[6346]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 10:03:15 ip-148-72-206-215 sshd[6346]: Disconnected from 91.224.92.190 port 12106 [preauth]
Feb 22 10:03:15 ip-148-72-206-215 sshd[6346]: Received disconnect from 91.224.92.190 port 12106:11: [preauth]
Feb 22 10:03:15 ip-148-72-206-215 sshd[6346]: Failed password for root from 91.224.92.190 port 12106 ssh2
Feb 22 10:03:14 ip-148-72-206-215 sshd[6346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:03:13 ip-148-72-206-215 sshd[6346]: Failed password for root from 91.224.92.190 port 12106 ssh2
Feb 22 10:03:11 ip-148-72-206-215 sshd[6346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:03:11 ip-148-72-206-215 sshd[6346]: Failed password for root from 91.224.92.190 port 12106 ssh2
Feb 22 10:03:09 ip-148-72-206-215 sshd[6346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 10:03:09 ip-148-72-206-215 sshd[6346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 10:03:09 ip-148-72-206-215 sshd[6346]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 09:57:12 ip-148-72-206-215 sshd[5975]: Disconnected from 45.148.10.152 port 43447 [preauth]
Feb 22 09:57:12 ip-148-72-206-215 sshd[5975]: Received disconnect from 45.148.10.152 port 43447:11: [preauth]
Feb 22 09:50:28 ip-148-72-206-215 sshd[5601]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 09:50:28 ip-148-72-206-215 sshd[5601]: Disconnected from 91.224.92.190 port 32158 [preauth]
Feb 22 09:50:28 ip-148-72-206-215 sshd[5601]: Received disconnect from 91.224.92.190 port 32158:11: [preauth]
Feb 22 09:50:28 ip-148-72-206-215 sshd[5601]: Failed password for root from 91.224.92.190 port 32158 ssh2
Feb 22 09:50:25 ip-148-72-206-215 sshd[5601]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:50:25 ip-148-72-206-215 sshd[5601]: Failed password for root from 91.224.92.190 port 32158 ssh2
Feb 22 09:50:23 ip-148-72-206-215 sshd[5601]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:50:23 ip-148-72-206-215 sshd[5601]: Failed password for root from 91.224.92.190 port 32158 ssh2
Feb 22 09:50:21 ip-148-72-206-215 sshd[5601]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:50:21 ip-148-72-206-215 sshd[5601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 09:50:21 ip-148-72-206-215 sshd[5601]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 09:43:45 ip-148-72-206-215 sshd[5201]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 09:43:45 ip-148-72-206-215 sshd[5201]: Disconnected from 195.178.110.15 port 11190 [preauth]
Feb 22 09:43:45 ip-148-72-206-215 sshd[5201]: Received disconnect from 195.178.110.15 port 11190:11: [preauth]
Feb 22 09:43:45 ip-148-72-206-215 sshd[5201]: Failed password for root from 195.178.110.15 port 11190 ssh2
Feb 22 09:43:43 ip-148-72-206-215 sshd[5201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:43:43 ip-148-72-206-215 sshd[5201]: Failed password for root from 195.178.110.15 port 11190 ssh2
Feb 22 09:43:41 ip-148-72-206-215 sshd[5201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:43:41 ip-148-72-206-215 sshd[5201]: Failed password for root from 195.178.110.15 port 11190 ssh2
Feb 22 09:43:39 ip-148-72-206-215 sshd[5201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:43:39 ip-148-72-206-215 sshd[5201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 09:39:51 ip-148-72-206-215 sshd[4976]: Connection closed by 209.38.91.248 port 39630 [preauth]
Feb 22 09:39:51 ip-148-72-206-215 sshd[4976]: Failed password for invalid user ollama from 209.38.91.248 port 39630 ssh2
Feb 22 09:39:49 ip-148-72-206-215 sshd[4976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:49 ip-148-72-206-215 sshd[4976]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:49 ip-148-72-206-215 sshd[4976]: input_userauth_request: invalid user ollama [preauth]
Feb 22 09:39:49 ip-148-72-206-215 sshd[4976]: Invalid user ollama from 209.38.91.248 port 39630
Feb 22 09:39:46 ip-148-72-206-215 sshd[4969]: Connection closed by 209.38.91.248 port 39610 [preauth]
Feb 22 09:39:46 ip-148-72-206-215 sshd[4969]: Failed password for invalid user codex from 209.38.91.248 port 39610 ssh2
Feb 22 09:39:44 ip-148-72-206-215 sshd[4969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:44 ip-148-72-206-215 sshd[4969]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:43 ip-148-72-206-215 sshd[4969]: input_userauth_request: invalid user codex [preauth]
Feb 22 09:39:43 ip-148-72-206-215 sshd[4969]: Invalid user codex from 209.38.91.248 port 39610
Feb 22 09:39:41 ip-148-72-206-215 sshd[4962]: Connection closed by 209.38.91.248 port 60654 [preauth]
Feb 22 09:39:41 ip-148-72-206-215 sshd[4962]: Failed password for invalid user deepseek from 209.38.91.248 port 60654 ssh2
Feb 22 09:39:38 ip-148-72-206-215 sshd[4962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:38 ip-148-72-206-215 sshd[4962]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:38 ip-148-72-206-215 sshd[4962]: input_userauth_request: invalid user deepseek [preauth]
Feb 22 09:39:38 ip-148-72-206-215 sshd[4962]: Invalid user deepseek from 209.38.91.248 port 60654
Feb 22 09:39:35 ip-148-72-206-215 sshd[4956]: Connection closed by 209.38.91.248 port 60648 [preauth]
Feb 22 09:39:35 ip-148-72-206-215 sshd[4956]: Failed password for root from 209.38.91.248 port 60648 ssh2
Feb 22 09:39:33 ip-148-72-206-215 sshd[4956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:39:33 ip-148-72-206-215 sshd[4956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248 user=root
Feb 22 09:39:30 ip-148-72-206-215 sshd[4949]: Connection closed by 209.38.91.248 port 57708 [preauth]
Feb 22 09:39:29 ip-148-72-206-215 sshd[4949]: Failed password for invalid user airflow from 209.38.91.248 port 57708 ssh2
Feb 22 09:39:28 ip-148-72-206-215 sshd[4949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:28 ip-148-72-206-215 sshd[4949]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:27 ip-148-72-206-215 sshd[4949]: input_userauth_request: invalid user airflow [preauth]
Feb 22 09:39:27 ip-148-72-206-215 sshd[4949]: Invalid user airflow from 209.38.91.248 port 57708
Feb 22 09:39:24 ip-148-72-206-215 sshd[4942]: Connection closed by 209.38.91.248 port 57698 [preauth]
Feb 22 09:39:24 ip-148-72-206-215 sshd[4942]: Failed password for invalid user lmstudio from 209.38.91.248 port 57698 ssh2
Feb 22 09:39:22 ip-148-72-206-215 sshd[4942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:22 ip-148-72-206-215 sshd[4942]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:22 ip-148-72-206-215 sshd[4942]: input_userauth_request: invalid user lmstudio [preauth]
Feb 22 09:39:22 ip-148-72-206-215 sshd[4942]: Invalid user lmstudio from 209.38.91.248 port 57698
Feb 22 09:39:18 ip-148-72-206-215 sshd[4935]: Connection closed by 209.38.91.248 port 59934 [preauth]
Feb 22 09:39:18 ip-148-72-206-215 sshd[4935]: Failed password for invalid user chatgpt from 209.38.91.248 port 59934 ssh2
Feb 22 09:39:17 ip-148-72-206-215 sshd[4935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:17 ip-148-72-206-215 sshd[4935]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:16 ip-148-72-206-215 sshd[4935]: input_userauth_request: invalid user chatgpt [preauth]
Feb 22 09:39:16 ip-148-72-206-215 sshd[4935]: Invalid user chatgpt from 209.38.91.248 port 59934
Feb 22 09:39:13 ip-148-72-206-215 sshd[4929]: Connection closed by 209.38.91.248 port 59930 [preauth]
Feb 22 09:39:13 ip-148-72-206-215 sshd[4929]: Failed password for invalid user ducc0x from 209.38.91.248 port 59930 ssh2
Feb 22 09:39:11 ip-148-72-206-215 sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:11 ip-148-72-206-215 sshd[4929]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:11 ip-148-72-206-215 sshd[4929]: input_userauth_request: invalid user ducc0x [preauth]
Feb 22 09:39:11 ip-148-72-206-215 sshd[4929]: Invalid user ducc0x from 209.38.91.248 port 59930
Feb 22 09:39:07 ip-148-72-206-215 sshd[4922]: Connection closed by 209.38.91.248 port 47480 [preauth]
Feb 22 09:39:07 ip-148-72-206-215 sshd[4922]: Failed password for invalid user openclaw from 209.38.91.248 port 47480 ssh2
Feb 22 09:39:06 ip-148-72-206-215 sshd[4922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248
Feb 22 09:39:06 ip-148-72-206-215 sshd[4922]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 09:39:05 ip-148-72-206-215 sshd[4922]: input_userauth_request: invalid user openclaw [preauth]
Feb 22 09:39:05 ip-148-72-206-215 sshd[4922]: Invalid user openclaw from 209.38.91.248 port 47480
Feb 22 09:37:45 ip-148-72-206-215 sshd[4844]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 09:37:45 ip-148-72-206-215 sshd[4844]: Disconnected from 195.178.110.15 port 15142 [preauth]
Feb 22 09:37:45 ip-148-72-206-215 sshd[4844]: Received disconnect from 195.178.110.15 port 15142:11: [preauth]
Feb 22 09:37:44 ip-148-72-206-215 sshd[4844]: Failed password for root from 195.178.110.15 port 15142 ssh2
Feb 22 09:37:42 ip-148-72-206-215 sshd[4844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:37:42 ip-148-72-206-215 sshd[4844]: Failed password for root from 195.178.110.15 port 15142 ssh2
Feb 22 09:37:40 ip-148-72-206-215 sshd[4844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:37:40 ip-148-72-206-215 sshd[4844]: Failed password for root from 195.178.110.15 port 15142 ssh2
Feb 22 09:37:39 ip-148-72-206-215 sshd[4844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:37:39 ip-148-72-206-215 sshd[4844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 09:37:03 ip-148-72-206-215 sshd[4799]: Connection closed by 209.38.91.248 port 56526 [preauth]
Feb 22 09:37:03 ip-148-72-206-215 sshd[4799]: Failed password for root from 209.38.91.248 port 56526 ssh2
Feb 22 09:37:00 ip-148-72-206-215 sshd[4799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:37:00 ip-148-72-206-215 sshd[4799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.91.248 user=root
Feb 22 09:36:34 ip-148-72-206-215 sshd[4782]: Did not receive identification string from 209.38.91.248 port 51126
Feb 22 09:31:06 ip-148-72-206-215 sshd[4454]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 09:31:06 ip-148-72-206-215 sshd[4454]: Disconnected from 45.148.10.151 port 59862 [preauth]
Feb 22 09:31:06 ip-148-72-206-215 sshd[4454]: Received disconnect from 45.148.10.151 port 59862:11: [preauth]
Feb 22 09:31:05 ip-148-72-206-215 sshd[4454]: Failed password for root from 45.148.10.151 port 59862 ssh2
Feb 22 09:31:04 ip-148-72-206-215 sshd[4454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:31:03 ip-148-72-206-215 sshd[4454]: Failed password for root from 45.148.10.151 port 59862 ssh2
Feb 22 09:31:02 ip-148-72-206-215 sshd[4454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:31:01 ip-148-72-206-215 sshd[4454]: Failed password for root from 45.148.10.151 port 59862 ssh2
Feb 22 09:30:59 ip-148-72-206-215 sshd[4454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:30:59 ip-148-72-206-215 sshd[4454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 09:25:05 ip-148-72-206-215 sshd[4003]: Disconnected from 45.148.10.151 port 53814 [preauth]
Feb 22 09:25:05 ip-148-72-206-215 sshd[4003]: Received disconnect from 45.148.10.151 port 53814:11: [preauth]
Feb 22 09:18:26 ip-148-72-206-215 sshd[3563]: Disconnected from 45.148.10.147 port 52796 [preauth]
Feb 22 09:18:26 ip-148-72-206-215 sshd[3563]: Received disconnect from 45.148.10.147 port 52796:11: [preauth]
Feb 22 09:17:37 ip-148-72-206-215 sshd[3521]: Connection closed by 170.64.223.170 port 41510 [preauth]
Feb 22 09:17:36 ip-148-72-206-215 sshd[3521]: Failed password for root from 170.64.223.170 port 41510 ssh2
Feb 22 09:17:35 ip-148-72-206-215 sshd[3521]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:17:35 ip-148-72-206-215 sshd[3521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:16:35 ip-148-72-206-215 sshd[3462]: Connection closed by 170.64.223.170 port 52030 [preauth]
Feb 22 09:16:34 ip-148-72-206-215 sshd[3462]: Failed password for root from 170.64.223.170 port 52030 ssh2
Feb 22 09:16:32 ip-148-72-206-215 sshd[3462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:16:32 ip-148-72-206-215 sshd[3462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:15:47 ip-148-72-206-215 sshd[3412]: Connection closed by 122.225.202.150 port 48079 [preauth]
Feb 22 09:15:47 ip-148-72-206-215 sshd[3412]: Failed password for root from 122.225.202.150 port 48079 ssh2
Feb 22 09:15:44 ip-148-72-206-215 sshd[3412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:15:44 ip-148-72-206-215 sshd[3412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.202.150 user=root
Feb 22 09:15:40 ip-148-72-206-215 sshd[3389]: Connection closed by 122.225.202.150 port 59200 [preauth]
Feb 22 09:15:40 ip-148-72-206-215 sshd[3389]: Failed password for root from 122.225.202.150 port 59200 ssh2
Feb 22 09:15:38 ip-148-72-206-215 sshd[3389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:15:38 ip-148-72-206-215 sshd[3389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.202.150 user=root
Feb 22 09:15:34 ip-148-72-206-215 sshd[3388]: Did not receive identification string from 122.225.202.150 port 58350
Feb 22 09:15:30 ip-148-72-206-215 sshd[3380]: Connection closed by 170.64.223.170 port 60306 [preauth]
Feb 22 09:15:29 ip-148-72-206-215 sshd[3380]: Failed password for root from 170.64.223.170 port 60306 ssh2
Feb 22 09:15:28 ip-148-72-206-215 sshd[3380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:15:28 ip-148-72-206-215 sshd[3380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:14:57 ip-148-72-206-215 sshd[3339]: Connection closed by 185.156.73.233 port 22228 [preauth]
Feb 22 09:14:57 ip-148-72-206-215 sshd[3339]: Failed password for root from 185.156.73.233 port 22228 ssh2
Feb 22 09:14:55 ip-148-72-206-215 sshd[3339]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:14:55 ip-148-72-206-215 sshd[3339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.73.233 user=root
Feb 22 09:14:12 ip-148-72-206-215 sshd[3295]: Connection closed by 170.64.223.170 port 47476 [preauth]
Feb 22 09:14:12 ip-148-72-206-215 sshd[3295]: Failed password for root from 170.64.223.170 port 47476 ssh2
Feb 22 09:14:10 ip-148-72-206-215 sshd[3295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:14:10 ip-148-72-206-215 sshd[3295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:13:02 ip-148-72-206-215 sshd[3216]: Connection closed by 170.64.223.170 port 57072 [preauth]
Feb 22 09:13:02 ip-148-72-206-215 sshd[3216]: Failed password for root from 170.64.223.170 port 57072 ssh2
Feb 22 09:13:00 ip-148-72-206-215 sshd[3216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:13:00 ip-148-72-206-215 sshd[3216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:12:28 ip-148-72-206-215 sshd[3182]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 09:12:28 ip-148-72-206-215 sshd[3182]: Disconnected from 91.224.92.108 port 5278 [preauth]
Feb 22 09:12:28 ip-148-72-206-215 sshd[3182]: Received disconnect from 91.224.92.108 port 5278:11: [preauth]
Feb 22 09:12:28 ip-148-72-206-215 sshd[3182]: Failed password for root from 91.224.92.108 port 5278 ssh2
Feb 22 09:12:27 ip-148-72-206-215 sshd[3182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:12:26 ip-148-72-206-215 sshd[3182]: Failed password for root from 91.224.92.108 port 5278 ssh2
Feb 22 09:12:24 ip-148-72-206-215 sshd[3182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:12:24 ip-148-72-206-215 sshd[3182]: Failed password for root from 91.224.92.108 port 5278 ssh2
Feb 22 09:12:22 ip-148-72-206-215 sshd[3182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:12:22 ip-148-72-206-215 sshd[3182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 09:12:21 ip-148-72-206-215 sshd[3182]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 09:11:56 ip-148-72-206-215 sshd[3156]: Connection closed by 170.64.223.170 port 47322 [preauth]
Feb 22 09:11:56 ip-148-72-206-215 sshd[3156]: Failed password for root from 170.64.223.170 port 47322 ssh2
Feb 22 09:11:55 ip-148-72-206-215 sshd[3156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:11:55 ip-148-72-206-215 sshd[3156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:10:44 ip-148-72-206-215 sshd[3087]: Connection closed by 170.64.223.170 port 33088 [preauth]
Feb 22 09:10:44 ip-148-72-206-215 sshd[3087]: Failed password for root from 170.64.223.170 port 33088 ssh2
Feb 22 09:10:42 ip-148-72-206-215 sshd[3087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:10:42 ip-148-72-206-215 sshd[3087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:09:28 ip-148-72-206-215 sshd[2999]: Connection closed by 170.64.223.170 port 48070 [preauth]
Feb 22 09:09:27 ip-148-72-206-215 sshd[2999]: Failed password for root from 170.64.223.170 port 48070 ssh2
Feb 22 09:09:25 ip-148-72-206-215 sshd[2999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:09:25 ip-148-72-206-215 sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:08:16 ip-148-72-206-215 sshd[2925]: Connection closed by 170.64.223.170 port 51922 [preauth]
Feb 22 09:08:15 ip-148-72-206-215 sshd[2925]: Failed password for root from 170.64.223.170 port 51922 ssh2
Feb 22 09:08:13 ip-148-72-206-215 sshd[2925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:08:13 ip-148-72-206-215 sshd[2925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:07:01 ip-148-72-206-215 sshd[2851]: Connection closed by 170.64.223.170 port 55884 [preauth]
Feb 22 09:07:00 ip-148-72-206-215 sshd[2851]: Failed password for root from 170.64.223.170 port 55884 ssh2
Feb 22 09:06:58 ip-148-72-206-215 sshd[2851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:06:58 ip-148-72-206-215 sshd[2851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:05:51 ip-148-72-206-215 sshd[2777]: Connection closed by 170.64.223.170 port 43996 [preauth]
Feb 22 09:05:50 ip-148-72-206-215 sshd[2777]: Failed password for root from 170.64.223.170 port 43996 ssh2
Feb 22 09:05:48 ip-148-72-206-215 sshd[2777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:05:48 ip-148-72-206-215 sshd[2777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:05:47 ip-148-72-206-215 sshd[2764]: Disconnected from 45.148.10.152 port 4270 [preauth]
Feb 22 09:05:47 ip-148-72-206-215 sshd[2764]: Received disconnect from 45.148.10.152 port 4270:11: [preauth]
Feb 22 09:04:34 ip-148-72-206-215 sshd[2695]: Connection closed by 170.64.223.170 port 45066 [preauth]
Feb 22 09:04:34 ip-148-72-206-215 sshd[2695]: Failed password for root from 170.64.223.170 port 45066 ssh2
Feb 22 09:04:32 ip-148-72-206-215 sshd[2695]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:04:32 ip-148-72-206-215 sshd[2695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:03:27 ip-148-72-206-215 sshd[2627]: Connection closed by 170.64.223.170 port 56004 [preauth]
Feb 22 09:03:27 ip-148-72-206-215 sshd[2627]: Failed password for root from 170.64.223.170 port 56004 ssh2
Feb 22 09:03:25 ip-148-72-206-215 sshd[2627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:03:25 ip-148-72-206-215 sshd[2627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:02:17 ip-148-72-206-215 sshd[2560]: Connection closed by 170.64.223.170 port 43434 [preauth]
Feb 22 09:02:17 ip-148-72-206-215 sshd[2560]: Failed password for root from 170.64.223.170 port 43434 ssh2
Feb 22 09:02:14 ip-148-72-206-215 sshd[2560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:02:14 ip-148-72-206-215 sshd[2560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 09:01:07 ip-148-72-206-215 sshd[2498]: Connection closed by 170.64.223.170 port 42504 [preauth]
Feb 22 09:01:06 ip-148-72-206-215 sshd[2498]: Failed password for root from 170.64.223.170 port 42504 ssh2
Feb 22 09:01:05 ip-148-72-206-215 sshd[2498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 09:01:05 ip-148-72-206-215 sshd[2498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 08:59:52 ip-148-72-206-215 sshd[2388]: Connection closed by 170.64.223.170 port 40428 [preauth]
Feb 22 08:59:52 ip-148-72-206-215 sshd[2388]: Failed password for root from 170.64.223.170 port 40428 ssh2
Feb 22 08:59:50 ip-148-72-206-215 sshd[2388]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:59:50 ip-148-72-206-215 sshd[2388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 08:59:08 ip-148-72-206-215 sshd[2336]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 08:59:08 ip-148-72-206-215 sshd[2336]: Disconnected from 45.148.10.152 port 45992 [preauth]
Feb 22 08:59:08 ip-148-72-206-215 sshd[2336]: Received disconnect from 45.148.10.152 port 45992:11: [preauth]
Feb 22 08:59:08 ip-148-72-206-215 sshd[2336]: Failed password for root from 45.148.10.152 port 45992 ssh2
Feb 22 08:59:06 ip-148-72-206-215 sshd[2336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:59:06 ip-148-72-206-215 sshd[2336]: Failed password for root from 45.148.10.152 port 45992 ssh2
Feb 22 08:59:04 ip-148-72-206-215 sshd[2336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:59:04 ip-148-72-206-215 sshd[2336]: Failed password for root from 45.148.10.152 port 45992 ssh2
Feb 22 08:59:03 ip-148-72-206-215 sshd[2336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:59:03 ip-148-72-206-215 sshd[2336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 08:58:32 ip-148-72-206-215 sshd[2306]: Connection closed by 170.64.223.170 port 52860 [preauth]
Feb 22 08:58:32 ip-148-72-206-215 sshd[2306]: Failed password for root from 170.64.223.170 port 52860 ssh2
Feb 22 08:58:30 ip-148-72-206-215 sshd[2306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:58:30 ip-148-72-206-215 sshd[2306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.223.170 user=root
Feb 22 08:57:08 ip-148-72-206-215 sshd[2234]: Did not receive identification string from 170.64.223.170 port 37972
Feb 22 08:53:07 ip-148-72-206-215 sshd[1988]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 08:53:07 ip-148-72-206-215 sshd[1988]: Disconnected from 91.224.92.190 port 33604 [preauth]
Feb 22 08:53:07 ip-148-72-206-215 sshd[1988]: Received disconnect from 91.224.92.190 port 33604:11: [preauth]
Feb 22 08:53:06 ip-148-72-206-215 sshd[1988]: Failed password for root from 91.224.92.190 port 33604 ssh2
Feb 22 08:53:04 ip-148-72-206-215 sshd[1988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:53:04 ip-148-72-206-215 sshd[1988]: Failed password for root from 91.224.92.190 port 33604 ssh2
Feb 22 08:53:03 ip-148-72-206-215 sshd[1988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:53:02 ip-148-72-206-215 sshd[1988]: Failed password for root from 91.224.92.190 port 33604 ssh2
Feb 22 08:53:00 ip-148-72-206-215 sshd[1988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:53:00 ip-148-72-206-215 sshd[1988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 08:53:00 ip-148-72-206-215 sshd[1988]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 08:46:46 ip-148-72-206-215 sshd[1552]: Disconnected from 45.148.10.147 port 40636 [preauth]
Feb 22 08:46:46 ip-148-72-206-215 sshd[1552]: Received disconnect from 45.148.10.147 port 40636:11: [preauth]
Feb 22 08:40:43 ip-148-72-206-215 sshd[1221]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 08:40:43 ip-148-72-206-215 sshd[1221]: Disconnected from 91.224.92.108 port 48718 [preauth]
Feb 22 08:40:43 ip-148-72-206-215 sshd[1221]: Received disconnect from 91.224.92.108 port 48718:11: [preauth]
Feb 22 08:40:42 ip-148-72-206-215 sshd[1221]: Failed password for root from 91.224.92.108 port 48718 ssh2
Feb 22 08:40:41 ip-148-72-206-215 sshd[1221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:40:41 ip-148-72-206-215 sshd[1221]: Failed password for root from 91.224.92.108 port 48718 ssh2
Feb 22 08:40:38 ip-148-72-206-215 sshd[1221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:40:38 ip-148-72-206-215 sshd[1221]: Failed password for root from 91.224.92.108 port 48718 ssh2
Feb 22 08:40:36 ip-148-72-206-215 sshd[1221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:40:36 ip-148-72-206-215 sshd[1221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 08:40:36 ip-148-72-206-215 sshd[1221]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 08:34:14 ip-148-72-206-215 sshd[823]: Disconnected from 45.148.10.152 port 39548 [preauth]
Feb 22 08:34:14 ip-148-72-206-215 sshd[823]: Received disconnect from 45.148.10.152 port 39548:11: [preauth]
Feb 22 08:28:27 ip-148-72-206-215 sshd[492]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 08:28:27 ip-148-72-206-215 sshd[492]: Disconnected from 45.148.10.157 port 50284 [preauth]
Feb 22 08:28:27 ip-148-72-206-215 sshd[492]: Received disconnect from 45.148.10.157 port 50284:11: [preauth]
Feb 22 08:28:27 ip-148-72-206-215 sshd[492]: Failed password for root from 45.148.10.157 port 50284 ssh2
Feb 22 08:28:25 ip-148-72-206-215 sshd[492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:28:25 ip-148-72-206-215 sshd[492]: Failed password for root from 45.148.10.157 port 50284 ssh2
Feb 22 08:28:23 ip-148-72-206-215 sshd[492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:28:22 ip-148-72-206-215 sshd[492]: Failed password for root from 45.148.10.157 port 50284 ssh2
Feb 22 08:28:20 ip-148-72-206-215 sshd[492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:28:20 ip-148-72-206-215 sshd[492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 08:24:48 ip-148-72-206-215 sshd[32750]: Connection closed by 209.38.26.35 port 57700 [preauth]
Feb 22 08:24:48 ip-148-72-206-215 sshd[32750]: Failed password for root from 209.38.26.35 port 57700 ssh2
Feb 22 08:24:47 ip-148-72-206-215 sshd[32750]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:24:47 ip-148-72-206-215 sshd[32750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:23:48 ip-148-72-206-215 sshd[32695]: Connection closed by 209.38.26.35 port 49790 [preauth]
Feb 22 08:23:47 ip-148-72-206-215 sshd[32695]: Failed password for root from 209.38.26.35 port 49790 ssh2
Feb 22 08:23:46 ip-148-72-206-215 sshd[32695]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:23:46 ip-148-72-206-215 sshd[32695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:22:48 ip-148-72-206-215 sshd[32642]: Connection closed by 209.38.26.35 port 40796 [preauth]
Feb 22 08:22:48 ip-148-72-206-215 sshd[32642]: Failed password for root from 209.38.26.35 port 40796 ssh2
Feb 22 08:22:47 ip-148-72-206-215 sshd[32642]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:22:47 ip-148-72-206-215 sshd[32642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:22:06 ip-148-72-206-215 sshd[32589]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 08:22:06 ip-148-72-206-215 sshd[32589]: Disconnected from 45.148.10.151 port 49832 [preauth]
Feb 22 08:22:06 ip-148-72-206-215 sshd[32589]: Received disconnect from 45.148.10.151 port 49832:11: [preauth]
Feb 22 08:22:06 ip-148-72-206-215 sshd[32589]: Failed password for root from 45.148.10.151 port 49832 ssh2
Feb 22 08:22:04 ip-148-72-206-215 sshd[32589]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:22:04 ip-148-72-206-215 sshd[32589]: Failed password for root from 45.148.10.151 port 49832 ssh2
Feb 22 08:22:02 ip-148-72-206-215 sshd[32589]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:22:02 ip-148-72-206-215 sshd[32589]: Failed password for root from 45.148.10.151 port 49832 ssh2
Feb 22 08:22:00 ip-148-72-206-215 sshd[32589]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:22:00 ip-148-72-206-215 sshd[32589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.151 user=root
Feb 22 08:21:47 ip-148-72-206-215 sshd[32574]: Connection closed by 209.38.26.35 port 48894 [preauth]
Feb 22 08:21:47 ip-148-72-206-215 sshd[32574]: Failed password for root from 209.38.26.35 port 48894 ssh2
Feb 22 08:21:45 ip-148-72-206-215 sshd[32574]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:21:45 ip-148-72-206-215 sshd[32574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:20:46 ip-148-72-206-215 sshd[32501]: Connection closed by 209.38.26.35 port 44360 [preauth]
Feb 22 08:20:46 ip-148-72-206-215 sshd[32501]: Failed password for root from 209.38.26.35 port 44360 ssh2
Feb 22 08:20:44 ip-148-72-206-215 sshd[32501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:20:44 ip-148-72-206-215 sshd[32501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:19:34 ip-148-72-206-215 sshd[32407]: Connection closed by 209.38.26.35 port 33632 [preauth]
Feb 22 08:19:34 ip-148-72-206-215 sshd[32407]: Failed password for root from 209.38.26.35 port 33632 ssh2
Feb 22 08:19:32 ip-148-72-206-215 sshd[32407]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:19:32 ip-148-72-206-215 sshd[32407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:18:27 ip-148-72-206-215 sshd[32335]: Connection closed by 209.38.26.35 port 48166 [preauth]
Feb 22 08:18:27 ip-148-72-206-215 sshd[32335]: Failed password for root from 209.38.26.35 port 48166 ssh2
Feb 22 08:18:26 ip-148-72-206-215 sshd[32335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:18:26 ip-148-72-206-215 sshd[32335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:17:24 ip-148-72-206-215 sshd[32263]: Connection closed by 209.38.26.35 port 36496 [preauth]
Feb 22 08:17:24 ip-148-72-206-215 sshd[32263]: Failed password for root from 209.38.26.35 port 36496 ssh2
Feb 22 08:17:22 ip-148-72-206-215 sshd[32263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:17:22 ip-148-72-206-215 sshd[32263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:16:27 ip-148-72-206-215 sshd[32178]: Connection closed by 209.38.26.35 port 58506 [preauth]
Feb 22 08:16:27 ip-148-72-206-215 sshd[32178]: Failed password for root from 209.38.26.35 port 58506 ssh2
Feb 22 08:16:24 ip-148-72-206-215 sshd[32178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:16:24 ip-148-72-206-215 sshd[32178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:16:12 ip-148-72-206-215 sshd[32154]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Feb 22 08:16:12 ip-148-72-206-215 sshd[32154]: Disconnected from 91.224.92.78 port 4116 [preauth]
Feb 22 08:16:12 ip-148-72-206-215 sshd[32154]: Received disconnect from 91.224.92.78 port 4116:11: [preauth]
Feb 22 08:16:12 ip-148-72-206-215 sshd[32154]: Failed password for root from 91.224.92.78 port 4116 ssh2
Feb 22 08:16:10 ip-148-72-206-215 sshd[32154]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:16:10 ip-148-72-206-215 sshd[32154]: Failed password for root from 91.224.92.78 port 4116 ssh2
Feb 22 08:16:08 ip-148-72-206-215 sshd[32154]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:16:08 ip-148-72-206-215 sshd[32154]: Failed password for root from 91.224.92.78 port 4116 ssh2
Feb 22 08:16:06 ip-148-72-206-215 sshd[32154]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:16:06 ip-148-72-206-215 sshd[32154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Feb 22 08:16:06 ip-148-72-206-215 sshd[32154]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 08:15:27 ip-148-72-206-215 sshd[32086]: Connection closed by 209.38.26.35 port 56970 [preauth]
Feb 22 08:15:27 ip-148-72-206-215 sshd[32086]: Failed password for root from 209.38.26.35 port 56970 ssh2
Feb 22 08:15:25 ip-148-72-206-215 sshd[32086]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:15:25 ip-148-72-206-215 sshd[32086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:14:22 ip-148-72-206-215 sshd[32013]: Connection closed by 209.38.26.35 port 53978 [preauth]
Feb 22 08:14:22 ip-148-72-206-215 sshd[32013]: Failed password for root from 209.38.26.35 port 53978 ssh2
Feb 22 08:14:20 ip-148-72-206-215 sshd[32013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:14:20 ip-148-72-206-215 sshd[32013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:13:23 ip-148-72-206-215 sshd[31937]: Connection closed by 209.38.26.35 port 59540 [preauth]
Feb 22 08:13:23 ip-148-72-206-215 sshd[31937]: Failed password for root from 209.38.26.35 port 59540 ssh2
Feb 22 08:13:21 ip-148-72-206-215 sshd[31937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:13:21 ip-148-72-206-215 sshd[31937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:12:26 ip-148-72-206-215 sshd[31880]: Connection closed by 209.38.26.35 port 49850 [preauth]
Feb 22 08:12:26 ip-148-72-206-215 sshd[31880]: Failed password for root from 209.38.26.35 port 49850 ssh2
Feb 22 08:12:24 ip-148-72-206-215 sshd[31880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:12:24 ip-148-72-206-215 sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:11:29 ip-148-72-206-215 sshd[31814]: Connection closed by 209.38.26.35 port 35970 [preauth]
Feb 22 08:11:29 ip-148-72-206-215 sshd[31814]: Failed password for root from 209.38.26.35 port 35970 ssh2
Feb 22 08:11:27 ip-148-72-206-215 sshd[31814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:11:27 ip-148-72-206-215 sshd[31814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:10:27 ip-148-72-206-215 sshd[31754]: Connection closed by 209.38.26.35 port 46280 [preauth]
Feb 22 08:10:27 ip-148-72-206-215 sshd[31754]: Failed password for root from 209.38.26.35 port 46280 ssh2
Feb 22 08:10:25 ip-148-72-206-215 sshd[31754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:10:25 ip-148-72-206-215 sshd[31754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:09:56 ip-148-72-206-215 sshd[31707]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 08:09:56 ip-148-72-206-215 sshd[31707]: Disconnected from 91.224.92.108 port 45492 [preauth]
Feb 22 08:09:56 ip-148-72-206-215 sshd[31707]: Received disconnect from 91.224.92.108 port 45492:11: [preauth]
Feb 22 08:09:56 ip-148-72-206-215 sshd[31707]: Failed password for root from 91.224.92.108 port 45492 ssh2
Feb 22 08:09:54 ip-148-72-206-215 sshd[31707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:09:54 ip-148-72-206-215 sshd[31707]: Failed password for root from 91.224.92.108 port 45492 ssh2
Feb 22 08:09:52 ip-148-72-206-215 sshd[31707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:09:52 ip-148-72-206-215 sshd[31707]: Failed password for root from 91.224.92.108 port 45492 ssh2
Feb 22 08:09:50 ip-148-72-206-215 sshd[31707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:09:50 ip-148-72-206-215 sshd[31707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 08:09:50 ip-148-72-206-215 sshd[31707]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 08:09:23 ip-148-72-206-215 sshd[31672]: Connection closed by 209.38.26.35 port 59430 [preauth]
Feb 22 08:09:22 ip-148-72-206-215 sshd[31672]: Failed password for root from 209.38.26.35 port 59430 ssh2
Feb 22 08:09:21 ip-148-72-206-215 sshd[31672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:09:21 ip-148-72-206-215 sshd[31672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:08:20 ip-148-72-206-215 sshd[31612]: Connection closed by 209.38.26.35 port 43380 [preauth]
Feb 22 08:08:20 ip-148-72-206-215 sshd[31612]: Failed password for root from 209.38.26.35 port 43380 ssh2
Feb 22 08:08:17 ip-148-72-206-215 sshd[31612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:08:17 ip-148-72-206-215 sshd[31612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:07:16 ip-148-72-206-215 sshd[31552]: Connection closed by 209.38.26.35 port 56770 [preauth]
Feb 22 08:07:16 ip-148-72-206-215 sshd[31552]: Failed password for root from 209.38.26.35 port 56770 ssh2
Feb 22 08:07:14 ip-148-72-206-215 sshd[31552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:07:14 ip-148-72-206-215 sshd[31552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:06:08 ip-148-72-206-215 sshd[31491]: Connection closed by 209.38.26.35 port 52678 [preauth]
Feb 22 08:06:08 ip-148-72-206-215 sshd[31491]: Failed password for root from 209.38.26.35 port 52678 ssh2
Feb 22 08:06:05 ip-148-72-206-215 sshd[31491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:06:05 ip-148-72-206-215 sshd[31491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:04:49 ip-148-72-206-215 sshd[31420]: Connection closed by 209.38.26.35 port 55442 [preauth]
Feb 22 08:04:49 ip-148-72-206-215 sshd[31420]: Failed password for root from 209.38.26.35 port 55442 ssh2
Feb 22 08:04:47 ip-148-72-206-215 sshd[31420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:04:47 ip-148-72-206-215 sshd[31420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:03:37 ip-148-72-206-215 sshd[31355]: Connection closed by 209.38.26.35 port 48222 [preauth]
Feb 22 08:03:37 ip-148-72-206-215 sshd[31355]: Failed password for root from 209.38.26.35 port 48222 ssh2
Feb 22 08:03:35 ip-148-72-206-215 sshd[31355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:03:35 ip-148-72-206-215 sshd[31355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:03:27 ip-148-72-206-215 sshd[31340]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 08:03:27 ip-148-72-206-215 sshd[31340]: Disconnected from 45.148.10.141 port 10172 [preauth]
Feb 22 08:03:27 ip-148-72-206-215 sshd[31340]: Received disconnect from 45.148.10.141 port 10172:11: [preauth]
Feb 22 08:03:26 ip-148-72-206-215 sshd[31340]: Failed password for root from 45.148.10.141 port 10172 ssh2
Feb 22 08:03:25 ip-148-72-206-215 sshd[31340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:03:24 ip-148-72-206-215 sshd[31340]: Failed password for root from 45.148.10.141 port 10172 ssh2
Feb 22 08:03:23 ip-148-72-206-215 sshd[31340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:03:22 ip-148-72-206-215 sshd[31340]: Failed password for root from 45.148.10.141 port 10172 ssh2
Feb 22 08:03:20 ip-148-72-206-215 sshd[31340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:03:20 ip-148-72-206-215 sshd[31340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 08:02:27 ip-148-72-206-215 sshd[31284]: Connection closed by 209.38.26.35 port 33198 [preauth]
Feb 22 08:02:26 ip-148-72-206-215 sshd[31284]: Failed password for root from 209.38.26.35 port 33198 ssh2
Feb 22 08:02:24 ip-148-72-206-215 sshd[31284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 08:02:24 ip-148-72-206-215 sshd[31284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.26.35 user=root
Feb 22 08:01:13 ip-148-72-206-215 sshd[31219]: Did not receive identification string from 209.38.26.35 port 49812
Feb 22 07:57:53 ip-148-72-206-215 sshd[30967]: Disconnected from 45.148.10.147 port 56326 [preauth]
Feb 22 07:57:53 ip-148-72-206-215 sshd[30967]: Received disconnect from 45.148.10.147 port 56326:11: [preauth]
Feb 22 07:51:20 ip-148-72-206-215 sshd[30604]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 07:51:20 ip-148-72-206-215 sshd[30604]: Disconnected from 45.148.10.157 port 1386 [preauth]
Feb 22 07:51:20 ip-148-72-206-215 sshd[30604]: Received disconnect from 45.148.10.157 port 1386:11: [preauth]
Feb 22 07:51:20 ip-148-72-206-215 sshd[30604]: Failed password for root from 45.148.10.157 port 1386 ssh2
Feb 22 07:51:18 ip-148-72-206-215 sshd[30604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:51:18 ip-148-72-206-215 sshd[30604]: Failed password for root from 45.148.10.157 port 1386 ssh2
Feb 22 07:51:16 ip-148-72-206-215 sshd[30604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:51:16 ip-148-72-206-215 sshd[30604]: Failed password for root from 45.148.10.157 port 1386 ssh2
Feb 22 07:51:15 ip-148-72-206-215 sshd[30604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:51:15 ip-148-72-206-215 sshd[30604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.157 user=root
Feb 22 07:50:29 ip-148-72-206-215 sshd[30567]: Did not receive identification string from 185.242.3.196 port 42158
Feb 22 07:45:33 ip-148-72-206-215 sshd[30278]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 07:45:33 ip-148-72-206-215 sshd[30278]: Disconnected from 91.224.92.190 port 18238 [preauth]
Feb 22 07:45:33 ip-148-72-206-215 sshd[30278]: Received disconnect from 91.224.92.190 port 18238:11: [preauth]
Feb 22 07:45:33 ip-148-72-206-215 sshd[30278]: Failed password for root from 91.224.92.190 port 18238 ssh2
Feb 22 07:45:30 ip-148-72-206-215 sshd[30278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:45:30 ip-148-72-206-215 sshd[30278]: Failed password for root from 91.224.92.190 port 18238 ssh2
Feb 22 07:45:29 ip-148-72-206-215 sshd[30278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:45:28 ip-148-72-206-215 sshd[30278]: Failed password for root from 91.224.92.190 port 18238 ssh2
Feb 22 07:45:26 ip-148-72-206-215 sshd[30278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:45:26 ip-148-72-206-215 sshd[30278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Feb 22 07:45:26 ip-148-72-206-215 sshd[30278]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 07:40:20 ip-148-72-206-215 sshd[29965]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 07:40:20 ip-148-72-206-215 sshd[29965]: Disconnected from 45.148.10.141 port 7468 [preauth]
Feb 22 07:40:20 ip-148-72-206-215 sshd[29965]: Received disconnect from 45.148.10.141 port 7468:11: [preauth]
Feb 22 07:40:20 ip-148-72-206-215 sshd[29965]: Failed password for root from 45.148.10.141 port 7468 ssh2
Feb 22 07:40:18 ip-148-72-206-215 sshd[29965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:40:18 ip-148-72-206-215 sshd[29965]: Failed password for root from 45.148.10.141 port 7468 ssh2
Feb 22 07:40:16 ip-148-72-206-215 sshd[29965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:40:16 ip-148-72-206-215 sshd[29965]: Failed password for root from 45.148.10.141 port 7468 ssh2
Feb 22 07:40:14 ip-148-72-206-215 sshd[29965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:40:14 ip-148-72-206-215 sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.141 user=root
Feb 22 07:33:14 ip-148-72-206-215 sshd[29567]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 07:33:14 ip-148-72-206-215 sshd[29567]: Disconnected from 45.148.10.147 port 31230 [preauth]
Feb 22 07:33:14 ip-148-72-206-215 sshd[29567]: Received disconnect from 45.148.10.147 port 31230:11: [preauth]
Feb 22 07:33:14 ip-148-72-206-215 sshd[29567]: Failed password for root from 45.148.10.147 port 31230 ssh2
Feb 22 07:33:12 ip-148-72-206-215 sshd[29567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:33:12 ip-148-72-206-215 sshd[29567]: Failed password for root from 45.148.10.147 port 31230 ssh2
Feb 22 07:33:10 ip-148-72-206-215 sshd[29567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:33:10 ip-148-72-206-215 sshd[29567]: Failed password for root from 45.148.10.147 port 31230 ssh2
Feb 22 07:33:08 ip-148-72-206-215 sshd[29567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:33:08 ip-148-72-206-215 sshd[29567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Feb 22 07:27:27 ip-148-72-206-215 sshd[29215]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 07:27:27 ip-148-72-206-215 sshd[29215]: Disconnected from 91.224.92.108 port 8360 [preauth]
Feb 22 07:27:27 ip-148-72-206-215 sshd[29215]: Received disconnect from 91.224.92.108 port 8360:11: [preauth]
Feb 22 07:27:27 ip-148-72-206-215 sshd[29215]: Failed password for root from 91.224.92.108 port 8360 ssh2
Feb 22 07:27:26 ip-148-72-206-215 sshd[29215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:27:25 ip-148-72-206-215 sshd[29215]: Failed password for root from 91.224.92.108 port 8360 ssh2
Feb 22 07:27:23 ip-148-72-206-215 sshd[29215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:27:23 ip-148-72-206-215 sshd[29215]: Failed password for root from 91.224.92.108 port 8360 ssh2
Feb 22 07:27:21 ip-148-72-206-215 sshd[29215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 07:27:21 ip-148-72-206-215 sshd[29215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 07:27:20 ip-148-72-206-215 sshd[29215]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 07:24:24 ip-148-72-206-215 sshd[29046]: Connection closed by 45.148.10.121 port 53998 [preauth]
Feb 22 07:21:44 ip-148-72-206-215 sshd[28884]: Disconnected from 45.148.10.141 port 59726 [preauth]
Feb 22 07:21:44 ip-148-72-206-215 sshd[28884]: Received disconnect from 45.148.10.141 port 59726:11: [preauth]
Feb 22 07:15:48 ip-148-72-206-215 sshd[28533]: Disconnected from 45.148.10.157 port 47396 [preauth]
Feb 22 07:15:48 ip-148-72-206-215 sshd[28533]: Received disconnect from 45.148.10.157 port 47396:11: [preauth]
Feb 22 07:09:36 ip-148-72-206-215 sshd[28106]: Disconnected from 45.148.10.141 port 23524 [preauth]
Feb 22 07:09:36 ip-148-72-206-215 sshd[28106]: Received disconnect from 45.148.10.141 port 23524:11: [preauth]
Feb 22 07:03:44 ip-148-72-206-215 sshd[27669]: Disconnected from 45.148.10.151 port 5490 [preauth]
Feb 22 07:03:44 ip-148-72-206-215 sshd[27669]: Received disconnect from 45.148.10.151 port 5490:11: [preauth]
Feb 22 06:58:08 ip-148-72-206-215 sshd[27306]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 06:58:08 ip-148-72-206-215 sshd[27306]: Disconnected from 195.178.110.15 port 12807 [preauth]
Feb 22 06:58:08 ip-148-72-206-215 sshd[27306]: Received disconnect from 195.178.110.15 port 12807:11: [preauth]
Feb 22 06:58:07 ip-148-72-206-215 sshd[27306]: Failed password for root from 195.178.110.15 port 12807 ssh2
Feb 22 06:58:05 ip-148-72-206-215 sshd[27306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:58:05 ip-148-72-206-215 sshd[27306]: Failed password for root from 195.178.110.15 port 12807 ssh2
Feb 22 06:58:03 ip-148-72-206-215 sshd[27306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:58:03 ip-148-72-206-215 sshd[27306]: Failed password for root from 195.178.110.15 port 12807 ssh2
Feb 22 06:58:00 ip-148-72-206-215 sshd[27306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:58:00 ip-148-72-206-215 sshd[27306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Feb 22 06:55:42 ip-148-72-206-215 sshd[27183]: Connection closed by 54.145.225.58 port 43302 [preauth]
Feb 22 06:52:04 ip-148-72-206-215 sshd[26966]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Feb 22 06:52:04 ip-148-72-206-215 sshd[26966]: Disconnected from 91.224.92.78 port 48094 [preauth]
Feb 22 06:52:04 ip-148-72-206-215 sshd[26966]: Received disconnect from 91.224.92.78 port 48094:11: [preauth]
Feb 22 06:52:03 ip-148-72-206-215 sshd[26966]: Failed password for root from 91.224.92.78 port 48094 ssh2
Feb 22 06:52:01 ip-148-72-206-215 sshd[26966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:52:01 ip-148-72-206-215 sshd[26966]: Failed password for root from 91.224.92.78 port 48094 ssh2
Feb 22 06:51:58 ip-148-72-206-215 sshd[26966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:51:58 ip-148-72-206-215 sshd[26966]: Failed password for root from 91.224.92.78 port 48094 ssh2
Feb 22 06:51:57 ip-148-72-206-215 sshd[26966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:51:57 ip-148-72-206-215 sshd[26966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Feb 22 06:51:56 ip-148-72-206-215 sshd[26966]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 06:46:33 ip-148-72-206-215 sshd[26605]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 06:46:33 ip-148-72-206-215 sshd[26605]: Disconnected from 91.224.92.108 port 11374 [preauth]
Feb 22 06:46:33 ip-148-72-206-215 sshd[26605]: Received disconnect from 91.224.92.108 port 11374:11: [preauth]
Feb 22 06:46:33 ip-148-72-206-215 sshd[26605]: Failed password for root from 91.224.92.108 port 11374 ssh2
Feb 22 06:46:30 ip-148-72-206-215 sshd[26605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:46:30 ip-148-72-206-215 sshd[26605]: Failed password for root from 91.224.92.108 port 11374 ssh2
Feb 22 06:46:28 ip-148-72-206-215 sshd[26605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:46:28 ip-148-72-206-215 sshd[26605]: Failed password for root from 91.224.92.108 port 11374 ssh2
Feb 22 06:46:27 ip-148-72-206-215 sshd[26605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:46:27 ip-148-72-206-215 sshd[26605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Feb 22 06:46:26 ip-148-72-206-215 sshd[26605]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 22 06:40:51 ip-148-72-206-215 sshd[26279]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 06:40:51 ip-148-72-206-215 sshd[26279]: Disconnected from 45.148.10.152 port 45036 [preauth]
Feb 22 06:40:51 ip-148-72-206-215 sshd[26279]: Received disconnect from 45.148.10.152 port 45036:11: [preauth]
Feb 22 06:40:51 ip-148-72-206-215 sshd[26279]: Failed password for root from 45.148.10.152 port 45036 ssh2
Feb 22 06:40:49 ip-148-72-206-215 sshd[26279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:40:48 ip-148-72-206-215 sshd[26279]: Failed password for root from 45.148.10.152 port 45036 ssh2
Feb 22 06:40:46 ip-148-72-206-215 sshd[26279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:40:46 ip-148-72-206-215 sshd[26279]: Failed password for root from 45.148.10.152 port 45036 ssh2
Feb 22 06:40:44 ip-148-72-206-215 sshd[26279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:40:44 ip-148-72-206-215 sshd[26279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 06:34:47 ip-148-72-206-215 sshd[25961]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 06:34:47 ip-148-72-206-215 sshd[25961]: Disconnected from 45.148.10.152 port 59670 [preauth]
Feb 22 06:34:47 ip-148-72-206-215 sshd[25961]: Received disconnect from 45.148.10.152 port 59670:11: [preauth]
Feb 22 06:34:47 ip-148-72-206-215 sshd[25961]: Failed password for root from 45.148.10.152 port 59670 ssh2
Feb 22 06:34:45 ip-148-72-206-215 sshd[25961]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:34:44 ip-148-72-206-215 sshd[25961]: Failed password for root from 45.148.10.152 port 59670 ssh2
Feb 22 06:34:43 ip-148-72-206-215 sshd[25961]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:34:43 ip-148-72-206-215 sshd[25961]: Failed password for root from 45.148.10.152 port 59670 ssh2
Feb 22 06:34:40 ip-148-72-206-215 sshd[25961]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Feb 22 06:34:40 ip-148-72-206-215 sshd[25961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.152 user=root
Feb 22 06:32:08 ip-148-72-206-215 sshd[25834]: Did not receive identification string from 198.235.24.102 port 50586
Feb 22 06:28:59 ip-148-72-206-215 sshd[25632]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root