Jan 31 22:55:43 ip-148-72-206-215 sshd[29642]: Did not receive identification string from 103.203.57.11 port 33178
Jan 31 22:34:56 ip-148-72-206-215 sshd[28434]: Did not receive identification string from 161.35.82.90 port 55680
Jan 31 22:25:56 ip-148-72-206-215 sshd[27849]: Connection closed by 134.122.62.168 port 48246 [preauth]
Jan 31 22:25:55 ip-148-72-206-215 sshd[27849]: Failed password for root from 134.122.62.168 port 48246 ssh2
Jan 31 22:25:54 ip-148-72-206-215 sshd[27849]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:25:54 ip-148-72-206-215 sshd[27849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:25:25 ip-148-72-206-215 sshd[27816]: Connection closed by 134.122.62.168 port 51524 [preauth]
Jan 31 22:25:24 ip-148-72-206-215 sshd[27816]: Failed password for root from 134.122.62.168 port 51524 ssh2
Jan 31 22:25:22 ip-148-72-206-215 sshd[27816]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:25:22 ip-148-72-206-215 sshd[27816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:24:50 ip-148-72-206-215 sshd[27787]: Connection closed by 134.122.62.168 port 45038 [preauth]
Jan 31 22:24:50 ip-148-72-206-215 sshd[27787]: Failed password for root from 134.122.62.168 port 45038 ssh2
Jan 31 22:24:47 ip-148-72-206-215 sshd[27787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:24:47 ip-148-72-206-215 sshd[27787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:24:16 ip-148-72-206-215 sshd[27753]: Connection closed by 134.122.62.168 port 44828 [preauth]
Jan 31 22:24:16 ip-148-72-206-215 sshd[27753]: Failed password for root from 134.122.62.168 port 44828 ssh2
Jan 31 22:24:14 ip-148-72-206-215 sshd[27753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:24:14 ip-148-72-206-215 sshd[27753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:23:41 ip-148-72-206-215 sshd[27720]: Connection closed by 134.122.62.168 port 39630 [preauth]
Jan 31 22:23:41 ip-148-72-206-215 sshd[27720]: Failed password for root from 134.122.62.168 port 39630 ssh2
Jan 31 22:23:39 ip-148-72-206-215 sshd[27720]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:23:39 ip-148-72-206-215 sshd[27720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:23:33 ip-148-72-206-215 sshd[27715]: Did not receive identification string from 146.190.27.128 port 44196
Jan 31 22:23:06 ip-148-72-206-215 sshd[27685]: Connection closed by 134.122.62.168 port 60306 [preauth]
Jan 31 22:23:06 ip-148-72-206-215 sshd[27685]: Failed password for root from 134.122.62.168 port 60306 ssh2
Jan 31 22:23:04 ip-148-72-206-215 sshd[27685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:23:04 ip-148-72-206-215 sshd[27685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:22:32 ip-148-72-206-215 sshd[27655]: Connection closed by 134.122.62.168 port 40278 [preauth]
Jan 31 22:22:32 ip-148-72-206-215 sshd[27655]: Failed password for root from 134.122.62.168 port 40278 ssh2
Jan 31 22:22:30 ip-148-72-206-215 sshd[27655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:22:30 ip-148-72-206-215 sshd[27655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:21:58 ip-148-72-206-215 sshd[27623]: Connection closed by 134.122.62.168 port 46514 [preauth]
Jan 31 22:21:57 ip-148-72-206-215 sshd[27623]: Failed password for root from 134.122.62.168 port 46514 ssh2
Jan 31 22:21:56 ip-148-72-206-215 sshd[27623]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:21:56 ip-148-72-206-215 sshd[27623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:21:24 ip-148-72-206-215 sshd[27592]: Connection closed by 134.122.62.168 port 36742 [preauth]
Jan 31 22:21:23 ip-148-72-206-215 sshd[27592]: Failed password for root from 134.122.62.168 port 36742 ssh2
Jan 31 22:21:21 ip-148-72-206-215 sshd[27592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:21:21 ip-148-72-206-215 sshd[27592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:20:50 ip-148-72-206-215 sshd[27559]: Connection closed by 134.122.62.168 port 47174 [preauth]
Jan 31 22:20:50 ip-148-72-206-215 sshd[27559]: Failed password for root from 134.122.62.168 port 47174 ssh2
Jan 31 22:20:47 ip-148-72-206-215 sshd[27559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:20:47 ip-148-72-206-215 sshd[27559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:20:14 ip-148-72-206-215 sshd[27529]: Connection closed by 134.122.62.168 port 33904 [preauth]
Jan 31 22:20:14 ip-148-72-206-215 sshd[27529]: Failed password for root from 134.122.62.168 port 33904 ssh2
Jan 31 22:20:11 ip-148-72-206-215 sshd[27529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:20:11 ip-148-72-206-215 sshd[27529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:19:39 ip-148-72-206-215 sshd[27482]: Connection closed by 134.122.62.168 port 42890 [preauth]
Jan 31 22:19:39 ip-148-72-206-215 sshd[27482]: Failed password for root from 134.122.62.168 port 42890 ssh2
Jan 31 22:19:37 ip-148-72-206-215 sshd[27482]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:19:37 ip-148-72-206-215 sshd[27482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:19:04 ip-148-72-206-215 sshd[27452]: Connection closed by 134.122.62.168 port 51684 [preauth]
Jan 31 22:19:04 ip-148-72-206-215 sshd[27452]: Failed password for root from 134.122.62.168 port 51684 ssh2
Jan 31 22:19:02 ip-148-72-206-215 sshd[27452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:19:02 ip-148-72-206-215 sshd[27452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:18:31 ip-148-72-206-215 sshd[27409]: Connection closed by 134.122.62.168 port 47230 [preauth]
Jan 31 22:18:30 ip-148-72-206-215 sshd[27409]: Failed password for root from 134.122.62.168 port 47230 ssh2
Jan 31 22:18:28 ip-148-72-206-215 sshd[27409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:18:28 ip-148-72-206-215 sshd[27409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:17:56 ip-148-72-206-215 sshd[27378]: Connection closed by 134.122.62.168 port 55698 [preauth]
Jan 31 22:17:56 ip-148-72-206-215 sshd[27378]: Failed password for root from 134.122.62.168 port 55698 ssh2
Jan 31 22:17:54 ip-148-72-206-215 sshd[27378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:17:54 ip-148-72-206-215 sshd[27378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:17:21 ip-148-72-206-215 sshd[27344]: Connection closed by 134.122.62.168 port 39522 [preauth]
Jan 31 22:17:21 ip-148-72-206-215 sshd[27344]: Failed password for root from 134.122.62.168 port 39522 ssh2
Jan 31 22:17:19 ip-148-72-206-215 sshd[27344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:17:19 ip-148-72-206-215 sshd[27344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:16:46 ip-148-72-206-215 sshd[27293]: Connection closed by 134.122.62.168 port 41232 [preauth]
Jan 31 22:16:46 ip-148-72-206-215 sshd[27293]: Failed password for root from 134.122.62.168 port 41232 ssh2
Jan 31 22:16:44 ip-148-72-206-215 sshd[27293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:16:44 ip-148-72-206-215 sshd[27293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:16:12 ip-148-72-206-215 sshd[27259]: Connection closed by 134.122.62.168 port 46226 [preauth]
Jan 31 22:16:11 ip-148-72-206-215 sshd[27259]: Failed password for root from 134.122.62.168 port 46226 ssh2
Jan 31 22:16:09 ip-148-72-206-215 sshd[27259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:16:09 ip-148-72-206-215 sshd[27259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:15:38 ip-148-72-206-215 sshd[27217]: Connection closed by 134.122.62.168 port 48574 [preauth]
Jan 31 22:15:37 ip-148-72-206-215 sshd[27217]: Failed password for root from 134.122.62.168 port 48574 ssh2
Jan 31 22:15:35 ip-148-72-206-215 sshd[27217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:15:35 ip-148-72-206-215 sshd[27217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:15:03 ip-148-72-206-215 sshd[27184]: Connection closed by 134.122.62.168 port 56394 [preauth]
Jan 31 22:15:03 ip-148-72-206-215 sshd[27184]: Failed password for root from 134.122.62.168 port 56394 ssh2
Jan 31 22:15:01 ip-148-72-206-215 sshd[27184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:15:01 ip-148-72-206-215 sshd[27184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:14:29 ip-148-72-206-215 sshd[27124]: Connection closed by 134.122.62.168 port 42116 [preauth]
Jan 31 22:14:29 ip-148-72-206-215 sshd[27124]: Failed password for root from 134.122.62.168 port 42116 ssh2
Jan 31 22:14:27 ip-148-72-206-215 sshd[27124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:14:27 ip-148-72-206-215 sshd[27124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:13:57 ip-148-72-206-215 sshd[27094]: Connection closed by 134.122.62.168 port 39896 [preauth]
Jan 31 22:13:57 ip-148-72-206-215 sshd[27094]: Failed password for root from 134.122.62.168 port 39896 ssh2
Jan 31 22:13:54 ip-148-72-206-215 sshd[27094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:13:54 ip-148-72-206-215 sshd[27094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:13:22 ip-148-72-206-215 sshd[27049]: Connection closed by 134.122.62.168 port 47034 [preauth]
Jan 31 22:13:21 ip-148-72-206-215 sshd[27049]: Failed password for root from 134.122.62.168 port 47034 ssh2
Jan 31 22:13:19 ip-148-72-206-215 sshd[27049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:13:19 ip-148-72-206-215 sshd[27049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:12:47 ip-148-72-206-215 sshd[27012]: Connection closed by 134.122.62.168 port 52686 [preauth]
Jan 31 22:12:47 ip-148-72-206-215 sshd[27012]: Failed password for root from 134.122.62.168 port 52686 ssh2
Jan 31 22:12:45 ip-148-72-206-215 sshd[27012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:12:45 ip-148-72-206-215 sshd[27012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:12:13 ip-148-72-206-215 sshd[26966]: Connection closed by 134.122.62.168 port 37904 [preauth]
Jan 31 22:12:12 ip-148-72-206-215 sshd[26966]: Failed password for root from 134.122.62.168 port 37904 ssh2
Jan 31 22:12:10 ip-148-72-206-215 sshd[26966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:12:10 ip-148-72-206-215 sshd[26966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:11:37 ip-148-72-206-215 sshd[26927]: Connection closed by 134.122.62.168 port 34454 [preauth]
Jan 31 22:11:37 ip-148-72-206-215 sshd[26927]: Failed password for root from 134.122.62.168 port 34454 ssh2
Jan 31 22:11:35 ip-148-72-206-215 sshd[26927]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:11:35 ip-148-72-206-215 sshd[26927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:11:02 ip-148-72-206-215 sshd[26885]: Connection closed by 134.122.62.168 port 40308 [preauth]
Jan 31 22:11:01 ip-148-72-206-215 sshd[26885]: Failed password for root from 134.122.62.168 port 40308 ssh2
Jan 31 22:11:00 ip-148-72-206-215 sshd[26885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:11:00 ip-148-72-206-215 sshd[26885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:10:23 ip-148-72-206-215 sshd[26820]: Connection closed by 134.122.62.168 port 44526 [preauth]
Jan 31 22:10:23 ip-148-72-206-215 sshd[26820]: Failed password for root from 134.122.62.168 port 44526 ssh2
Jan 31 22:10:21 ip-148-72-206-215 sshd[26820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:10:21 ip-148-72-206-215 sshd[26820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:09:47 ip-148-72-206-215 sshd[26775]: Connection closed by 134.122.62.168 port 46972 [preauth]
Jan 31 22:09:46 ip-148-72-206-215 sshd[26775]: Failed password for root from 134.122.62.168 port 46972 ssh2
Jan 31 22:09:44 ip-148-72-206-215 sshd[26775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:09:44 ip-148-72-206-215 sshd[26775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:09:06 ip-148-72-206-215 sshd[26732]: Connection closed by 134.122.62.168 port 37878 [preauth]
Jan 31 22:09:06 ip-148-72-206-215 sshd[26732]: Failed password for root from 134.122.62.168 port 37878 ssh2
Jan 31 22:09:04 ip-148-72-206-215 sshd[26732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:09:04 ip-148-72-206-215 sshd[26732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:08:27 ip-148-72-206-215 sshd[26677]: Connection closed by 134.122.62.168 port 38152 [preauth]
Jan 31 22:08:27 ip-148-72-206-215 sshd[26677]: Failed password for root from 134.122.62.168 port 38152 ssh2
Jan 31 22:08:25 ip-148-72-206-215 sshd[26677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:08:25 ip-148-72-206-215 sshd[26677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:07:47 ip-148-72-206-215 sshd[26633]: Connection closed by 134.122.62.168 port 33766 [preauth]
Jan 31 22:07:46 ip-148-72-206-215 sshd[26633]: Failed password for root from 134.122.62.168 port 33766 ssh2
Jan 31 22:07:44 ip-148-72-206-215 sshd[26633]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:07:44 ip-148-72-206-215 sshd[26633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:07:02 ip-148-72-206-215 sshd[26558]: Connection closed by 134.122.62.168 port 33568 [preauth]
Jan 31 22:07:01 ip-148-72-206-215 sshd[26558]: Failed password for root from 134.122.62.168 port 33568 ssh2
Jan 31 22:07:00 ip-148-72-206-215 sshd[26558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:07:00 ip-148-72-206-215 sshd[26558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:06:19 ip-148-72-206-215 sshd[26499]: Connection closed by 134.122.62.168 port 58046 [preauth]
Jan 31 22:06:18 ip-148-72-206-215 sshd[26499]: Failed password for root from 134.122.62.168 port 58046 ssh2
Jan 31 22:06:16 ip-148-72-206-215 sshd[26499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 22:06:16 ip-148-72-206-215 sshd[26499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.168 user=root
Jan 31 22:05:01 ip-148-72-206-215 sshd[26419]: Did not receive identification string from 134.122.62.168 port 38240
Jan 31 20:41:21 ip-148-72-206-215 sshd[21262]: Connection closed by 188.166.88.153 port 51480 [preauth]
Jan 31 20:41:19 ip-148-72-206-215 sshd[21258]: Connection closed by 188.166.88.153 port 51466 [preauth]
Jan 31 20:41:16 ip-148-72-206-215 sshd[21255]: Connection closed by 188.166.88.153 port 51454 [preauth]
Jan 31 20:41:15 ip-148-72-206-215 sshd[21252]: Connection closed by 188.166.88.153 port 44334 [preauth]
Jan 31 20:41:14 ip-148-72-206-215 sshd[21249]: Connection closed by 188.166.88.153 port 44324 [preauth]
Jan 31 20:41:12 ip-148-72-206-215 sshd[21246]: Connection closed by 188.166.88.153 port 44308 [preauth]
Jan 31 20:41:11 ip-148-72-206-215 sshd[21243]: Connection closed by 188.166.88.153 port 44304 [preauth]
Jan 31 20:41:10 ip-148-72-206-215 sshd[21240]: Connection closed by 188.166.88.153 port 44292 [preauth]
Jan 31 20:41:09 ip-148-72-206-215 sshd[21237]: Connection closed by 188.166.88.153 port 44276 [preauth]
Jan 31 20:41:08 ip-148-72-206-215 sshd[21234]: Connection closed by 188.166.88.153 port 44262 [preauth]
Jan 31 20:41:07 ip-148-72-206-215 sshd[21230]: Connection closed by 188.166.88.153 port 44260 [preauth]
Jan 31 20:41:05 ip-148-72-206-215 sshd[21227]: Connection closed by 188.166.88.153 port 42026 [preauth]
Jan 31 20:41:04 ip-148-72-206-215 sshd[21224]: Connection closed by 188.166.88.153 port 42020 [preauth]
Jan 31 20:41:02 ip-148-72-206-215 sshd[21221]: Connection closed by 188.166.88.153 port 42014 [preauth]
Jan 31 20:41:01 ip-148-72-206-215 sshd[21217]: Connection closed by 188.166.88.153 port 42002 [preauth]
Jan 31 20:40:59 ip-148-72-206-215 sshd[21214]: Connection closed by 188.166.88.153 port 41998 [preauth]
Jan 31 20:40:57 ip-148-72-206-215 sshd[21207]: Connection closed by 188.166.88.153 port 41990 [preauth]
Jan 31 20:40:56 ip-148-72-206-215 sshd[21201]: Connection closed by 188.166.88.153 port 57824 [preauth]
Jan 31 20:24:35 ip-148-72-206-215 sshd[20126]: Bad protocol version identification 'MGLNDD_148.72.206.215_22' from 172.203.245.192 port 42880
Jan 31 20:24:35 ip-148-72-206-215 sshd[20113]: Did not receive identification string from 172.203.245.192 port 38918
Jan 31 18:38:37 ip-148-72-206-215 sshd[13628]: Connection closed by 192.142.25.95 port 14358 [preauth]
Jan 31 18:38:36 ip-148-72-206-215 sshd[13628]: Failed password for invalid user \357\273\277root from 192.142.25.95 port 14358 ssh2
Jan 31 18:38:34 ip-148-72-206-215 sshd[13628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.142.25.95
Jan 31 18:38:34 ip-148-72-206-215 sshd[13628]: pam_unix(sshd:auth): check pass; user unknown
Jan 31 18:38:33 ip-148-72-206-215 sshd[13628]: input_userauth_request: invalid user \\357\\273\\277root [preauth]
Jan 31 18:38:33 ip-148-72-206-215 sshd[13628]: Invalid user \357\273\277root from 192.142.25.95 port 14358
Jan 31 18:38:33 ip-148-72-206-215 sshd[13628]: reverse mapping checking getaddrinfo for hosted-by.host-palace.com [192.142.25.95] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 18:36:30 ip-148-72-206-215 sshd[13521]: Connection reset by 198.235.24.104 port 61382 [preauth]
Jan 31 17:53:28 ip-148-72-206-215 sshd[10900]: Did not receive identification string from 180.93.255.93 port 64864
Jan 31 17:51:41 ip-148-72-206-215 sshd[10776]: Disconnected from 45.148.10.147 port 28646 [preauth]
Jan 31 17:51:41 ip-148-72-206-215 sshd[10776]: Received disconnect from 45.148.10.147 port 28646:11: [preauth]
Jan 31 17:38:47 ip-148-72-206-215 sshd[10054]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:38:47 ip-148-72-206-215 sshd[10054]: Disconnected from 45.227.254.170 port 61095 [preauth]
Jan 31 17:38:47 ip-148-72-206-215 sshd[10054]: Received disconnect from 45.227.254.170 port 61095:11: [preauth]
Jan 31 17:38:46 ip-148-72-206-215 sshd[10054]: Failed password for root from 45.227.254.170 port 61095 ssh2
Jan 31 17:38:44 ip-148-72-206-215 sshd[10054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:44 ip-148-72-206-215 sshd[10054]: Failed password for root from 45.227.254.170 port 61095 ssh2
Jan 31 17:38:42 ip-148-72-206-215 sshd[10054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:42 ip-148-72-206-215 sshd[10054]: Failed password for root from 45.227.254.170 port 61095 ssh2
Jan 31 17:38:40 ip-148-72-206-215 sshd[10054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:40 ip-148-72-206-215 sshd[10054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:38:38 ip-148-72-206-215 sshd[10045]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:38:38 ip-148-72-206-215 sshd[10045]: Disconnected from 45.227.254.170 port 54872 [preauth]
Jan 31 17:38:38 ip-148-72-206-215 sshd[10045]: Received disconnect from 45.227.254.170 port 54872:11: [preauth]
Jan 31 17:38:38 ip-148-72-206-215 sshd[10045]: Failed password for root from 45.227.254.170 port 54872 ssh2
Jan 31 17:38:36 ip-148-72-206-215 sshd[10045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:35 ip-148-72-206-215 sshd[10045]: Failed password for root from 45.227.254.170 port 54872 ssh2
Jan 31 17:38:33 ip-148-72-206-215 sshd[10045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:33 ip-148-72-206-215 sshd[10045]: Failed password for root from 45.227.254.170 port 54872 ssh2
Jan 31 17:38:31 ip-148-72-206-215 sshd[10045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:31 ip-148-72-206-215 sshd[10045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:38:30 ip-148-72-206-215 sshd[10034]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:38:30 ip-148-72-206-215 sshd[10034]: Disconnected from 45.227.254.170 port 48998 [preauth]
Jan 31 17:38:30 ip-148-72-206-215 sshd[10034]: Received disconnect from 45.227.254.170 port 48998:11: [preauth]
Jan 31 17:38:29 ip-148-72-206-215 sshd[10034]: Failed password for root from 45.227.254.170 port 48998 ssh2
Jan 31 17:38:27 ip-148-72-206-215 sshd[10034]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:27 ip-148-72-206-215 sshd[10034]: Failed password for root from 45.227.254.170 port 48998 ssh2
Jan 31 17:38:24 ip-148-72-206-215 sshd[10034]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:24 ip-148-72-206-215 sshd[10034]: Failed password for root from 45.227.254.170 port 48998 ssh2
Jan 31 17:38:23 ip-148-72-206-215 sshd[10034]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:38:23 ip-148-72-206-215 sshd[10034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 17:25:09 ip-148-72-206-215 sshd[9246]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 17:25:09 ip-148-72-206-215 sshd[9246]: Disconnected from 91.224.92.74 port 49554 [preauth]
Jan 31 17:25:09 ip-148-72-206-215 sshd[9246]: Received disconnect from 91.224.92.74 port 49554:11: [preauth]
Jan 31 17:25:09 ip-148-72-206-215 sshd[9246]: Failed password for root from 91.224.92.74 port 49554 ssh2
Jan 31 17:25:07 ip-148-72-206-215 sshd[9246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:25:07 ip-148-72-206-215 sshd[9246]: Failed password for root from 91.224.92.74 port 49554 ssh2
Jan 31 17:25:05 ip-148-72-206-215 sshd[9246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:25:05 ip-148-72-206-215 sshd[9246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 17:25:05 ip-148-72-206-215 sshd[9246]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:25:04 ip-148-72-206-215 sshd[9238]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 17:25:04 ip-148-72-206-215 sshd[9238]: Disconnected from 91.224.92.74 port 49532 [preauth]
Jan 31 17:25:04 ip-148-72-206-215 sshd[9238]: Received disconnect from 91.224.92.74 port 49532:11: [preauth]
Jan 31 17:25:04 ip-148-72-206-215 sshd[9238]: Failed password for root from 91.224.92.74 port 49532 ssh2
Jan 31 17:25:02 ip-148-72-206-215 sshd[9238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:25:01 ip-148-72-206-215 sshd[9238]: Failed password for root from 91.224.92.74 port 49532 ssh2
Jan 31 17:24:59 ip-148-72-206-215 sshd[9238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:24:59 ip-148-72-206-215 sshd[9238]: Failed password for root from 91.224.92.74 port 49532 ssh2
Jan 31 17:24:58 ip-148-72-206-215 sshd[9238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:24:58 ip-148-72-206-215 sshd[9238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 17:24:58 ip-148-72-206-215 sshd[9238]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:20:52 ip-148-72-206-215 sshd[8999]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:52 ip-148-72-206-215 sshd[8999]: Disconnected from 91.224.92.54 port 35035 [preauth]
Jan 31 17:20:52 ip-148-72-206-215 sshd[8999]: Received disconnect from 91.224.92.54 port 35035:11: [preauth]
Jan 31 17:20:52 ip-148-72-206-215 sshd[8999]: Failed password for root from 91.224.92.54 port 35035 ssh2
Jan 31 17:20:49 ip-148-72-206-215 sshd[8999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:49 ip-148-72-206-215 sshd[8999]: Failed password for root from 91.224.92.54 port 35035 ssh2
Jan 31 17:20:47 ip-148-72-206-215 sshd[8999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:47 ip-148-72-206-215 sshd[8999]: Failed password for root from 91.224.92.54 port 35035 ssh2
Jan 31 17:20:45 ip-148-72-206-215 sshd[8999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:45 ip-148-72-206-215 sshd[8999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:45 ip-148-72-206-215 sshd[8999]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:20:43 ip-148-72-206-215 sshd[8990]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:43 ip-148-72-206-215 sshd[8990]: Disconnected from 91.224.92.54 port 45336 [preauth]
Jan 31 17:20:43 ip-148-72-206-215 sshd[8990]: Received disconnect from 91.224.92.54 port 45336:11: [preauth]
Jan 31 17:20:43 ip-148-72-206-215 sshd[8990]: Failed password for root from 91.224.92.54 port 45336 ssh2
Jan 31 17:20:41 ip-148-72-206-215 sshd[8990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:41 ip-148-72-206-215 sshd[8990]: Failed password for root from 91.224.92.54 port 45336 ssh2
Jan 31 17:20:39 ip-148-72-206-215 sshd[8990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:39 ip-148-72-206-215 sshd[8990]: Failed password for root from 91.224.92.54 port 45336 ssh2
Jan 31 17:20:36 ip-148-72-206-215 sshd[8990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:36 ip-148-72-206-215 sshd[8990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:36 ip-148-72-206-215 sshd[8990]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:20:35 ip-148-72-206-215 sshd[8981]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:35 ip-148-72-206-215 sshd[8981]: Disconnected from 91.224.92.54 port 45324 [preauth]
Jan 31 17:20:35 ip-148-72-206-215 sshd[8981]: Received disconnect from 91.224.92.54 port 45324:11: [preauth]
Jan 31 17:20:35 ip-148-72-206-215 sshd[8981]: Failed password for root from 91.224.92.54 port 45324 ssh2
Jan 31 17:20:32 ip-148-72-206-215 sshd[8981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:32 ip-148-72-206-215 sshd[8981]: Failed password for root from 91.224.92.54 port 45324 ssh2
Jan 31 17:20:31 ip-148-72-206-215 sshd[8981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:30 ip-148-72-206-215 sshd[8981]: Failed password for root from 91.224.92.54 port 45324 ssh2
Jan 31 17:20:28 ip-148-72-206-215 sshd[8981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:20:28 ip-148-72-206-215 sshd[8981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:20:28 ip-148-72-206-215 sshd[8981]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:14:04 ip-148-72-206-215 sshd[8570]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:14:04 ip-148-72-206-215 sshd[8570]: Disconnected from 91.224.92.54 port 28084 [preauth]
Jan 31 17:14:04 ip-148-72-206-215 sshd[8570]: Received disconnect from 91.224.92.54 port 28084:11: [preauth]
Jan 31 17:14:03 ip-148-72-206-215 sshd[8570]: Failed password for root from 91.224.92.54 port 28084 ssh2
Jan 31 17:14:01 ip-148-72-206-215 sshd[8570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:14:01 ip-148-72-206-215 sshd[8570]: Failed password for root from 91.224.92.54 port 28084 ssh2
Jan 31 17:13:59 ip-148-72-206-215 sshd[8570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:59 ip-148-72-206-215 sshd[8570]: Failed password for root from 91.224.92.54 port 28084 ssh2
Jan 31 17:13:57 ip-148-72-206-215 sshd[8570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:57 ip-148-72-206-215 sshd[8570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:13:57 ip-148-72-206-215 sshd[8570]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:13:55 ip-148-72-206-215 sshd[8562]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:13:55 ip-148-72-206-215 sshd[8562]: Disconnected from 91.224.92.54 port 28060 [preauth]
Jan 31 17:13:55 ip-148-72-206-215 sshd[8562]: Received disconnect from 91.224.92.54 port 28060:11: [preauth]
Jan 31 17:13:55 ip-148-72-206-215 sshd[8562]: Failed password for root from 91.224.92.54 port 28060 ssh2
Jan 31 17:13:53 ip-148-72-206-215 sshd[8562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:53 ip-148-72-206-215 sshd[8562]: Failed password for root from 91.224.92.54 port 28060 ssh2
Jan 31 17:13:51 ip-148-72-206-215 sshd[8562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:51 ip-148-72-206-215 sshd[8562]: Failed password for root from 91.224.92.54 port 28060 ssh2
Jan 31 17:13:49 ip-148-72-206-215 sshd[8562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:49 ip-148-72-206-215 sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:13:49 ip-148-72-206-215 sshd[8562]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 17:13:48 ip-148-72-206-215 sshd[8553]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:13:48 ip-148-72-206-215 sshd[8553]: Disconnected from 91.224.92.54 port 51714 [preauth]
Jan 31 17:13:48 ip-148-72-206-215 sshd[8553]: Received disconnect from 91.224.92.54 port 51714:11: [preauth]
Jan 31 17:13:47 ip-148-72-206-215 sshd[8553]: Failed password for root from 91.224.92.54 port 51714 ssh2
Jan 31 17:13:46 ip-148-72-206-215 sshd[8553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:46 ip-148-72-206-215 sshd[8553]: Failed password for root from 91.224.92.54 port 51714 ssh2
Jan 31 17:13:43 ip-148-72-206-215 sshd[8553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:43 ip-148-72-206-215 sshd[8553]: Failed password for root from 91.224.92.54 port 51714 ssh2
Jan 31 17:13:41 ip-148-72-206-215 sshd[8553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 17:13:41 ip-148-72-206-215 sshd[8553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 17:13:41 ip-148-72-206-215 sshd[8553]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 16:54:06 ip-148-72-206-215 sshd[7262]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:54:06 ip-148-72-206-215 sshd[7262]: Disconnected from 195.178.110.15 port 46766 [preauth]
Jan 31 16:54:06 ip-148-72-206-215 sshd[7262]: Received disconnect from 195.178.110.15 port 46766:11: [preauth]
Jan 31 16:54:05 ip-148-72-206-215 sshd[7262]: Failed password for root from 195.178.110.15 port 46766 ssh2
Jan 31 16:54:03 ip-148-72-206-215 sshd[7262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:54:03 ip-148-72-206-215 sshd[7262]: Failed password for root from 195.178.110.15 port 46766 ssh2
Jan 31 16:54:01 ip-148-72-206-215 sshd[7262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:54:00 ip-148-72-206-215 sshd[7262]: Failed password for root from 195.178.110.15 port 46766 ssh2
Jan 31 16:53:58 ip-148-72-206-215 sshd[7262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:58 ip-148-72-206-215 sshd[7262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:53:56 ip-148-72-206-215 sshd[7253]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:53:56 ip-148-72-206-215 sshd[7253]: Disconnected from 195.178.110.15 port 50099 [preauth]
Jan 31 16:53:56 ip-148-72-206-215 sshd[7253]: Received disconnect from 195.178.110.15 port 50099:11: [preauth]
Jan 31 16:53:56 ip-148-72-206-215 sshd[7253]: Failed password for root from 195.178.110.15 port 50099 ssh2
Jan 31 16:53:54 ip-148-72-206-215 sshd[7253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:54 ip-148-72-206-215 sshd[7253]: Failed password for root from 195.178.110.15 port 50099 ssh2
Jan 31 16:53:53 ip-148-72-206-215 sshd[7253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:52 ip-148-72-206-215 sshd[7253]: Failed password for root from 195.178.110.15 port 50099 ssh2
Jan 31 16:53:50 ip-148-72-206-215 sshd[7253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:50 ip-148-72-206-215 sshd[7253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:53:47 ip-148-72-206-215 sshd[7244]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:53:47 ip-148-72-206-215 sshd[7244]: Disconnected from 195.178.110.15 port 30316 [preauth]
Jan 31 16:53:47 ip-148-72-206-215 sshd[7244]: Received disconnect from 195.178.110.15 port 30316:11: [preauth]
Jan 31 16:53:47 ip-148-72-206-215 sshd[7244]: Failed password for root from 195.178.110.15 port 30316 ssh2
Jan 31 16:53:44 ip-148-72-206-215 sshd[7244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:44 ip-148-72-206-215 sshd[7244]: Failed password for root from 195.178.110.15 port 30316 ssh2
Jan 31 16:53:43 ip-148-72-206-215 sshd[7244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:42 ip-148-72-206-215 sshd[7244]: Failed password for root from 195.178.110.15 port 30316 ssh2
Jan 31 16:53:41 ip-148-72-206-215 sshd[7244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:53:41 ip-148-72-206-215 sshd[7244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:49:13 ip-148-72-206-215 sshd[7007]: Bad protocol version identification 'GET / HTTP/1.1' from 85.11.183.6 port 57822
Jan 31 16:49:12 ip-148-72-206-215 sshd[7005]: Bad protocol version identification '\026\003\001\002' from 85.11.183.6 port 57810
Jan 31 16:44:39 ip-148-72-206-215 sshd[6753]: Connection closed by 206.168.34.112 port 14118 [preauth]
Jan 31 16:15:00 ip-148-72-206-215 sshd[4958]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:15:00 ip-148-72-206-215 sshd[4958]: Disconnected from 91.224.92.78 port 39218 [preauth]
Jan 31 16:15:00 ip-148-72-206-215 sshd[4958]: Received disconnect from 91.224.92.78 port 39218:11: [preauth]
Jan 31 16:15:00 ip-148-72-206-215 sshd[4958]: Failed password for root from 91.224.92.78 port 39218 ssh2
Jan 31 16:14:58 ip-148-72-206-215 sshd[4958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:58 ip-148-72-206-215 sshd[4958]: Failed password for root from 91.224.92.78 port 39218 ssh2
Jan 31 16:14:56 ip-148-72-206-215 sshd[4958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:56 ip-148-72-206-215 sshd[4958]: Failed password for root from 91.224.92.78 port 39218 ssh2
Jan 31 16:14:54 ip-148-72-206-215 sshd[4958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:54 ip-148-72-206-215 sshd[4958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:14:54 ip-148-72-206-215 sshd[4958]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 16:14:53 ip-148-72-206-215 sshd[4946]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:14:53 ip-148-72-206-215 sshd[4946]: Disconnected from 91.224.92.78 port 31192 [preauth]
Jan 31 16:14:53 ip-148-72-206-215 sshd[4946]: Received disconnect from 91.224.92.78 port 31192:11: [preauth]
Jan 31 16:14:53 ip-148-72-206-215 sshd[4946]: Failed password for root from 91.224.92.78 port 31192 ssh2
Jan 31 16:14:51 ip-148-72-206-215 sshd[4946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:51 ip-148-72-206-215 sshd[4946]: Failed password for root from 91.224.92.78 port 31192 ssh2
Jan 31 16:14:48 ip-148-72-206-215 sshd[4946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:48 ip-148-72-206-215 sshd[4946]: Failed password for root from 91.224.92.78 port 31192 ssh2
Jan 31 16:14:47 ip-148-72-206-215 sshd[4946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:47 ip-148-72-206-215 sshd[4946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:14:46 ip-148-72-206-215 sshd[4946]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 16:14:45 ip-148-72-206-215 sshd[4937]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:14:45 ip-148-72-206-215 sshd[4937]: Disconnected from 91.224.92.78 port 58002 [preauth]
Jan 31 16:14:45 ip-148-72-206-215 sshd[4937]: Received disconnect from 91.224.92.78 port 58002:11: [preauth]
Jan 31 16:14:45 ip-148-72-206-215 sshd[4937]: Failed password for root from 91.224.92.78 port 58002 ssh2
Jan 31 16:14:43 ip-148-72-206-215 sshd[4937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:43 ip-148-72-206-215 sshd[4937]: Failed password for root from 91.224.92.78 port 58002 ssh2
Jan 31 16:14:40 ip-148-72-206-215 sshd[4937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:40 ip-148-72-206-215 sshd[4937]: Failed password for root from 91.224.92.78 port 58002 ssh2
Jan 31 16:14:38 ip-148-72-206-215 sshd[4937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:14:38 ip-148-72-206-215 sshd[4937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 16:14:38 ip-148-72-206-215 sshd[4937]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 16:08:21 ip-148-72-206-215 sshd[4481]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:08:21 ip-148-72-206-215 sshd[4481]: Disconnected from 195.178.110.15 port 26330 [preauth]
Jan 31 16:08:21 ip-148-72-206-215 sshd[4481]: Received disconnect from 195.178.110.15 port 26330:11: [preauth]
Jan 31 16:08:21 ip-148-72-206-215 sshd[4481]: Failed password for root from 195.178.110.15 port 26330 ssh2
Jan 31 16:08:19 ip-148-72-206-215 sshd[4481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:19 ip-148-72-206-215 sshd[4481]: Failed password for root from 195.178.110.15 port 26330 ssh2
Jan 31 16:08:17 ip-148-72-206-215 sshd[4481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:17 ip-148-72-206-215 sshd[4481]: Failed password for root from 195.178.110.15 port 26330 ssh2
Jan 31 16:08:15 ip-148-72-206-215 sshd[4481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:15 ip-148-72-206-215 sshd[4481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:08:13 ip-148-72-206-215 sshd[4473]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:08:13 ip-148-72-206-215 sshd[4473]: Disconnected from 195.178.110.15 port 15206 [preauth]
Jan 31 16:08:13 ip-148-72-206-215 sshd[4473]: Received disconnect from 195.178.110.15 port 15206:11: [preauth]
Jan 31 16:08:13 ip-148-72-206-215 sshd[4473]: Failed password for root from 195.178.110.15 port 15206 ssh2
Jan 31 16:08:11 ip-148-72-206-215 sshd[4473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:11 ip-148-72-206-215 sshd[4473]: Failed password for root from 195.178.110.15 port 15206 ssh2
Jan 31 16:08:10 ip-148-72-206-215 sshd[4473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:10 ip-148-72-206-215 sshd[4473]: Failed password for root from 195.178.110.15 port 15206 ssh2
Jan 31 16:08:08 ip-148-72-206-215 sshd[4473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:08 ip-148-72-206-215 sshd[4473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:08:06 ip-148-72-206-215 sshd[4433]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:08:06 ip-148-72-206-215 sshd[4433]: Disconnected from 195.178.110.15 port 38402 [preauth]
Jan 31 16:08:06 ip-148-72-206-215 sshd[4433]: Received disconnect from 195.178.110.15 port 38402:11: [preauth]
Jan 31 16:08:06 ip-148-72-206-215 sshd[4433]: Failed password for root from 195.178.110.15 port 38402 ssh2
Jan 31 16:08:04 ip-148-72-206-215 sshd[4433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:04 ip-148-72-206-215 sshd[4433]: Failed password for root from 195.178.110.15 port 38402 ssh2
Jan 31 16:08:02 ip-148-72-206-215 sshd[4433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:02 ip-148-72-206-215 sshd[4433]: Failed password for root from 195.178.110.15 port 38402 ssh2
Jan 31 16:08:00 ip-148-72-206-215 sshd[4433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:08:00 ip-148-72-206-215 sshd[4433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 16:01:41 ip-148-72-206-215 sshd[4021]: Disconnected from 45.148.10.147 port 21302 [preauth]
Jan 31 16:01:41 ip-148-72-206-215 sshd[4021]: Received disconnect from 45.148.10.147 port 21302:11: [preauth]
Jan 31 16:01:28 ip-148-72-206-215 sshd[4012]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 16:01:28 ip-148-72-206-215 sshd[4012]: Disconnected from 45.148.10.147 port 10736 [preauth]
Jan 31 16:01:28 ip-148-72-206-215 sshd[4012]: Received disconnect from 45.148.10.147 port 10736:11: [preauth]
Jan 31 16:01:28 ip-148-72-206-215 sshd[4012]: Failed password for root from 45.148.10.147 port 10736 ssh2
Jan 31 16:01:25 ip-148-72-206-215 sshd[4012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:01:25 ip-148-72-206-215 sshd[4012]: Failed password for root from 45.148.10.147 port 10736 ssh2
Jan 31 16:01:24 ip-148-72-206-215 sshd[4012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:01:23 ip-148-72-206-215 sshd[4012]: Failed password for root from 45.148.10.147 port 10736 ssh2
Jan 31 16:01:21 ip-148-72-206-215 sshd[4012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 16:01:21 ip-148-72-206-215 sshd[4012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 15:55:18 ip-148-72-206-215 sshd[3641]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:55:18 ip-148-72-206-215 sshd[3641]: Disconnected from 91.224.92.78 port 23522 [preauth]
Jan 31 15:55:18 ip-148-72-206-215 sshd[3641]: Received disconnect from 91.224.92.78 port 23522:11: [preauth]
Jan 31 15:55:18 ip-148-72-206-215 sshd[3641]: Failed password for root from 91.224.92.78 port 23522 ssh2
Jan 31 15:55:16 ip-148-72-206-215 sshd[3641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:16 ip-148-72-206-215 sshd[3641]: Failed password for root from 91.224.92.78 port 23522 ssh2
Jan 31 15:55:14 ip-148-72-206-215 sshd[3641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:14 ip-148-72-206-215 sshd[3641]: Failed password for root from 91.224.92.78 port 23522 ssh2
Jan 31 15:55:12 ip-148-72-206-215 sshd[3641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:12 ip-148-72-206-215 sshd[3641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:55:11 ip-148-72-206-215 sshd[3641]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:55:10 ip-148-72-206-215 sshd[3630]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:55:10 ip-148-72-206-215 sshd[3630]: Disconnected from 91.224.92.78 port 58406 [preauth]
Jan 31 15:55:10 ip-148-72-206-215 sshd[3630]: Received disconnect from 91.224.92.78 port 58406:11: [preauth]
Jan 31 15:55:10 ip-148-72-206-215 sshd[3630]: Failed password for root from 91.224.92.78 port 58406 ssh2
Jan 31 15:55:07 ip-148-72-206-215 sshd[3630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:07 ip-148-72-206-215 sshd[3630]: Failed password for root from 91.224.92.78 port 58406 ssh2
Jan 31 15:55:05 ip-148-72-206-215 sshd[3630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:04 ip-148-72-206-215 sshd[3630]: Failed password for root from 91.224.92.78 port 58406 ssh2
Jan 31 15:55:03 ip-148-72-206-215 sshd[3630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:55:03 ip-148-72-206-215 sshd[3630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:55:02 ip-148-72-206-215 sshd[3630]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:55:00 ip-148-72-206-215 sshd[3622]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:55:00 ip-148-72-206-215 sshd[3622]: Disconnected from 91.224.92.78 port 58390 [preauth]
Jan 31 15:55:00 ip-148-72-206-215 sshd[3622]: Received disconnect from 91.224.92.78 port 58390:11: [preauth]
Jan 31 15:54:59 ip-148-72-206-215 sshd[3622]: Failed password for root from 91.224.92.78 port 58390 ssh2
Jan 31 15:54:58 ip-148-72-206-215 sshd[3622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:54:57 ip-148-72-206-215 sshd[3622]: Failed password for root from 91.224.92.78 port 58390 ssh2
Jan 31 15:54:55 ip-148-72-206-215 sshd[3622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:54:55 ip-148-72-206-215 sshd[3622]: Failed password for root from 91.224.92.78 port 58390 ssh2
Jan 31 15:54:53 ip-148-72-206-215 sshd[3622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:54:53 ip-148-72-206-215 sshd[3622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:54:53 ip-148-72-206-215 sshd[3622]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:52:41 ip-148-72-206-215 sshd[3508]: Connection closed by 45.148.10.121 port 37538 [preauth]
Jan 31 15:52:41 ip-148-72-206-215 sshd[3508]: Failed password for invalid user admin from 45.148.10.121 port 37538 ssh2
Jan 31 15:52:39 ip-148-72-206-215 sshd[3508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.121
Jan 31 15:52:39 ip-148-72-206-215 sshd[3508]: pam_unix(sshd:auth): check pass; user unknown
Jan 31 15:52:39 ip-148-72-206-215 sshd[3508]: input_userauth_request: invalid user admin [preauth]
Jan 31 15:52:39 ip-148-72-206-215 sshd[3508]: Invalid user admin from 45.148.10.121 port 37538
Jan 31 15:48:32 ip-148-72-206-215 sshd[3271]: Disconnected from 45.148.10.147 port 11886 [preauth]
Jan 31 15:48:32 ip-148-72-206-215 sshd[3271]: Received disconnect from 45.148.10.147 port 11886:11: [preauth]
Jan 31 15:42:25 ip-148-72-206-215 sshd[2963]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:25 ip-148-72-206-215 sshd[2963]: Disconnected from 91.224.92.190 port 19209 [preauth]
Jan 31 15:42:25 ip-148-72-206-215 sshd[2963]: Received disconnect from 91.224.92.190 port 19209:11: [preauth]
Jan 31 15:42:24 ip-148-72-206-215 sshd[2963]: Failed password for root from 91.224.92.190 port 19209 ssh2
Jan 31 15:42:23 ip-148-72-206-215 sshd[2963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:23 ip-148-72-206-215 sshd[2963]: Failed password for root from 91.224.92.190 port 19209 ssh2
Jan 31 15:42:21 ip-148-72-206-215 sshd[2963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:21 ip-148-72-206-215 sshd[2963]: Failed password for root from 91.224.92.190 port 19209 ssh2
Jan 31 15:42:19 ip-148-72-206-215 sshd[2963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:19 ip-148-72-206-215 sshd[2963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:19 ip-148-72-206-215 sshd[2963]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:42:18 ip-148-72-206-215 sshd[2956]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:18 ip-148-72-206-215 sshd[2956]: Disconnected from 91.224.92.190 port 45532 [preauth]
Jan 31 15:42:18 ip-148-72-206-215 sshd[2956]: Received disconnect from 91.224.92.190 port 45532:11: [preauth]
Jan 31 15:42:17 ip-148-72-206-215 sshd[2956]: Failed password for root from 91.224.92.190 port 45532 ssh2
Jan 31 15:42:16 ip-148-72-206-215 sshd[2956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:15 ip-148-72-206-215 sshd[2956]: Failed password for root from 91.224.92.190 port 45532 ssh2
Jan 31 15:42:14 ip-148-72-206-215 sshd[2956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:14 ip-148-72-206-215 sshd[2956]: Failed password for root from 91.224.92.190 port 45532 ssh2
Jan 31 15:42:12 ip-148-72-206-215 sshd[2956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:12 ip-148-72-206-215 sshd[2956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:12 ip-148-72-206-215 sshd[2956]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:42:11 ip-148-72-206-215 sshd[2948]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:11 ip-148-72-206-215 sshd[2948]: Disconnected from 91.224.92.190 port 16104 [preauth]
Jan 31 15:42:11 ip-148-72-206-215 sshd[2948]: Received disconnect from 91.224.92.190 port 16104:11: [preauth]
Jan 31 15:42:10 ip-148-72-206-215 sshd[2948]: Failed password for root from 91.224.92.190 port 16104 ssh2
Jan 31 15:42:09 ip-148-72-206-215 sshd[2948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:09 ip-148-72-206-215 sshd[2948]: Failed password for root from 91.224.92.190 port 16104 ssh2
Jan 31 15:42:07 ip-148-72-206-215 sshd[2948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:07 ip-148-72-206-215 sshd[2948]: Failed password for root from 91.224.92.190 port 16104 ssh2
Jan 31 15:42:05 ip-148-72-206-215 sshd[2948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:42:05 ip-148-72-206-215 sshd[2948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 15:42:05 ip-148-72-206-215 sshd[2948]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:35:59 ip-148-72-206-215 sshd[2616]: Connection reset by 146.190.29.141 port 24623 [preauth]
Jan 31 15:29:34 ip-148-72-206-215 sshd[2182]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:34 ip-148-72-206-215 sshd[2182]: Disconnected from 91.224.92.78 port 44872 [preauth]
Jan 31 15:29:34 ip-148-72-206-215 sshd[2182]: Received disconnect from 91.224.92.78 port 44872:11: [preauth]
Jan 31 15:29:33 ip-148-72-206-215 sshd[2182]: Failed password for root from 91.224.92.78 port 44872 ssh2
Jan 31 15:29:32 ip-148-72-206-215 sshd[2182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:32 ip-148-72-206-215 sshd[2182]: Failed password for root from 91.224.92.78 port 44872 ssh2
Jan 31 15:29:30 ip-148-72-206-215 sshd[2182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:30 ip-148-72-206-215 sshd[2182]: Failed password for root from 91.224.92.78 port 44872 ssh2
Jan 31 15:29:28 ip-148-72-206-215 sshd[2182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:28 ip-148-72-206-215 sshd[2182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:28 ip-148-72-206-215 sshd[2182]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:29:27 ip-148-72-206-215 sshd[2174]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:27 ip-148-72-206-215 sshd[2174]: Disconnected from 91.224.92.78 port 51024 [preauth]
Jan 31 15:29:27 ip-148-72-206-215 sshd[2174]: Received disconnect from 91.224.92.78 port 51024:11: [preauth]
Jan 31 15:29:27 ip-148-72-206-215 sshd[2174]: Failed password for root from 91.224.92.78 port 51024 ssh2
Jan 31 15:29:25 ip-148-72-206-215 sshd[2174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:25 ip-148-72-206-215 sshd[2174]: Failed password for root from 91.224.92.78 port 51024 ssh2
Jan 31 15:29:22 ip-148-72-206-215 sshd[2174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:22 ip-148-72-206-215 sshd[2174]: Failed password for root from 91.224.92.78 port 51024 ssh2
Jan 31 15:29:21 ip-148-72-206-215 sshd[2174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:21 ip-148-72-206-215 sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:20 ip-148-72-206-215 sshd[2174]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:29:19 ip-148-72-206-215 sshd[2165]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:19 ip-148-72-206-215 sshd[2165]: Disconnected from 91.224.92.78 port 26570 [preauth]
Jan 31 15:29:19 ip-148-72-206-215 sshd[2165]: Received disconnect from 91.224.92.78 port 26570:11: [preauth]
Jan 31 15:29:19 ip-148-72-206-215 sshd[2165]: Failed password for root from 91.224.92.78 port 26570 ssh2
Jan 31 15:29:17 ip-148-72-206-215 sshd[2165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:17 ip-148-72-206-215 sshd[2165]: Failed password for root from 91.224.92.78 port 26570 ssh2
Jan 31 15:29:15 ip-148-72-206-215 sshd[2165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:15 ip-148-72-206-215 sshd[2165]: Failed password for root from 91.224.92.78 port 26570 ssh2
Jan 31 15:29:13 ip-148-72-206-215 sshd[2165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:29:13 ip-148-72-206-215 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 15:29:13 ip-148-72-206-215 sshd[2165]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 15:18:20 ip-148-72-206-215 sshd[1556]: Connection closed by 45.148.10.121 port 40050 [preauth]
Jan 31 15:04:10 ip-148-72-206-215 sshd[605]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 15:04:10 ip-148-72-206-215 sshd[605]: Disconnected from 45.227.254.170 port 42611 [preauth]
Jan 31 15:04:10 ip-148-72-206-215 sshd[605]: Received disconnect from 45.227.254.170 port 42611:11: [preauth]
Jan 31 15:04:09 ip-148-72-206-215 sshd[605]: Failed password for root from 45.227.254.170 port 42611 ssh2
Jan 31 15:04:08 ip-148-72-206-215 sshd[605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:04:07 ip-148-72-206-215 sshd[605]: Failed password for root from 45.227.254.170 port 42611 ssh2
Jan 31 15:04:05 ip-148-72-206-215 sshd[605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:04:05 ip-148-72-206-215 sshd[605]: Failed password for root from 45.227.254.170 port 42611 ssh2
Jan 31 15:04:04 ip-148-72-206-215 sshd[605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:04:04 ip-148-72-206-215 sshd[605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 15:04:02 ip-148-72-206-215 sshd[559]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 15:04:02 ip-148-72-206-215 sshd[559]: Disconnected from 45.227.254.170 port 42786 [preauth]
Jan 31 15:04:02 ip-148-72-206-215 sshd[559]: Received disconnect from 45.227.254.170 port 42786:11: [preauth]
Jan 31 15:04:02 ip-148-72-206-215 sshd[559]: Failed password for root from 45.227.254.170 port 42786 ssh2
Jan 31 15:04:00 ip-148-72-206-215 sshd[559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:59 ip-148-72-206-215 sshd[559]: Failed password for root from 45.227.254.170 port 42786 ssh2
Jan 31 15:03:58 ip-148-72-206-215 sshd[559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:57 ip-148-72-206-215 sshd[559]: Failed password for root from 45.227.254.170 port 42786 ssh2
Jan 31 15:03:55 ip-148-72-206-215 sshd[559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:55 ip-148-72-206-215 sshd[559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 15:03:54 ip-148-72-206-215 sshd[549]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 15:03:54 ip-148-72-206-215 sshd[549]: Disconnected from 45.227.254.170 port 42772 [preauth]
Jan 31 15:03:54 ip-148-72-206-215 sshd[549]: Received disconnect from 45.227.254.170 port 42772:11: [preauth]
Jan 31 15:03:53 ip-148-72-206-215 sshd[549]: Failed password for root from 45.227.254.170 port 42772 ssh2
Jan 31 15:03:51 ip-148-72-206-215 sshd[549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:51 ip-148-72-206-215 sshd[549]: Failed password for root from 45.227.254.170 port 42772 ssh2
Jan 31 15:03:49 ip-148-72-206-215 sshd[549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:48 ip-148-72-206-215 sshd[549]: Failed password for root from 45.227.254.170 port 42772 ssh2
Jan 31 15:03:47 ip-148-72-206-215 sshd[549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 15:03:47 ip-148-72-206-215 sshd[549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:51:13 ip-148-72-206-215 sshd[32320]: Connection closed by 64.62.197.58 port 23945 [preauth]
Jan 31 14:51:09 ip-148-72-206-215 sshd[32309]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:51:09 ip-148-72-206-215 sshd[32309]: Disconnected from 91.224.92.74 port 10960 [preauth]
Jan 31 14:51:09 ip-148-72-206-215 sshd[32309]: Received disconnect from 91.224.92.74 port 10960:11: [preauth]
Jan 31 14:51:09 ip-148-72-206-215 sshd[32309]: Failed password for root from 91.224.92.74 port 10960 ssh2
Jan 31 14:51:07 ip-148-72-206-215 sshd[32309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:51:07 ip-148-72-206-215 sshd[32309]: Failed password for root from 91.224.92.74 port 10960 ssh2
Jan 31 14:51:05 ip-148-72-206-215 sshd[32309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:51:05 ip-148-72-206-215 sshd[32309]: Failed password for root from 91.224.92.74 port 10960 ssh2
Jan 31 14:51:03 ip-148-72-206-215 sshd[32309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:51:03 ip-148-72-206-215 sshd[32309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:51:02 ip-148-72-206-215 sshd[32309]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:51:00 ip-148-72-206-215 sshd[32300]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:51:00 ip-148-72-206-215 sshd[32300]: Disconnected from 91.224.92.74 port 58704 [preauth]
Jan 31 14:51:00 ip-148-72-206-215 sshd[32300]: Received disconnect from 91.224.92.74 port 58704:11: [preauth]
Jan 31 14:51:00 ip-148-72-206-215 sshd[32300]: Failed password for root from 91.224.92.74 port 58704 ssh2
Jan 31 14:50:58 ip-148-72-206-215 sshd[32300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:58 ip-148-72-206-215 sshd[32300]: Failed password for root from 91.224.92.74 port 58704 ssh2
Jan 31 14:50:56 ip-148-72-206-215 sshd[32300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:56 ip-148-72-206-215 sshd[32300]: Failed password for root from 91.224.92.74 port 58704 ssh2
Jan 31 14:50:54 ip-148-72-206-215 sshd[32300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:54 ip-148-72-206-215 sshd[32300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:50:54 ip-148-72-206-215 sshd[32300]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:50:53 ip-148-72-206-215 sshd[32290]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:50:53 ip-148-72-206-215 sshd[32290]: Disconnected from 91.224.92.74 port 58654 [preauth]
Jan 31 14:50:53 ip-148-72-206-215 sshd[32290]: Received disconnect from 91.224.92.74 port 58654:11: [preauth]
Jan 31 14:50:52 ip-148-72-206-215 sshd[32290]: Failed password for root from 91.224.92.74 port 58654 ssh2
Jan 31 14:50:50 ip-148-72-206-215 sshd[32290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:50 ip-148-72-206-215 sshd[32290]: Failed password for root from 91.224.92.74 port 58654 ssh2
Jan 31 14:50:48 ip-148-72-206-215 sshd[32290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:48 ip-148-72-206-215 sshd[32290]: Failed password for root from 91.224.92.74 port 58654 ssh2
Jan 31 14:50:46 ip-148-72-206-215 sshd[32290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:50:46 ip-148-72-206-215 sshd[32290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:50:46 ip-148-72-206-215 sshd[32290]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:38:38 ip-148-72-206-215 sshd[31626]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:38 ip-148-72-206-215 sshd[31626]: Disconnected from 91.224.92.78 port 46322 [preauth]
Jan 31 14:38:38 ip-148-72-206-215 sshd[31626]: Received disconnect from 91.224.92.78 port 46322:11: [preauth]
Jan 31 14:38:37 ip-148-72-206-215 sshd[31626]: Failed password for root from 91.224.92.78 port 46322 ssh2
Jan 31 14:38:36 ip-148-72-206-215 sshd[31626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:35 ip-148-72-206-215 sshd[31626]: Failed password for root from 91.224.92.78 port 46322 ssh2
Jan 31 14:38:34 ip-148-72-206-215 sshd[31626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:33 ip-148-72-206-215 sshd[31626]: Failed password for root from 91.224.92.78 port 46322 ssh2
Jan 31 14:38:31 ip-148-72-206-215 sshd[31626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:31 ip-148-72-206-215 sshd[31626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:31 ip-148-72-206-215 sshd[31626]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:38:30 ip-148-72-206-215 sshd[31618]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:30 ip-148-72-206-215 sshd[31618]: Disconnected from 91.224.92.78 port 46306 [preauth]
Jan 31 14:38:30 ip-148-72-206-215 sshd[31618]: Received disconnect from 91.224.92.78 port 46306:11: [preauth]
Jan 31 14:38:30 ip-148-72-206-215 sshd[31618]: Failed password for root from 91.224.92.78 port 46306 ssh2
Jan 31 14:38:28 ip-148-72-206-215 sshd[31618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:28 ip-148-72-206-215 sshd[31618]: Failed password for root from 91.224.92.78 port 46306 ssh2
Jan 31 14:38:26 ip-148-72-206-215 sshd[31618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:26 ip-148-72-206-215 sshd[31618]: Failed password for root from 91.224.92.78 port 46306 ssh2
Jan 31 14:38:24 ip-148-72-206-215 sshd[31618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:24 ip-148-72-206-215 sshd[31618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:24 ip-148-72-206-215 sshd[31618]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:38:23 ip-148-72-206-215 sshd[31610]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:23 ip-148-72-206-215 sshd[31610]: Disconnected from 91.224.92.78 port 51120 [preauth]
Jan 31 14:38:23 ip-148-72-206-215 sshd[31610]: Received disconnect from 91.224.92.78 port 51120:11: [preauth]
Jan 31 14:38:22 ip-148-72-206-215 sshd[31610]: Failed password for root from 91.224.92.78 port 51120 ssh2
Jan 31 14:38:21 ip-148-72-206-215 sshd[31610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:21 ip-148-72-206-215 sshd[31610]: Failed password for root from 91.224.92.78 port 51120 ssh2
Jan 31 14:38:19 ip-148-72-206-215 sshd[31610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:19 ip-148-72-206-215 sshd[31610]: Failed password for root from 91.224.92.78 port 51120 ssh2
Jan 31 14:38:17 ip-148-72-206-215 sshd[31610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:38:17 ip-148-72-206-215 sshd[31610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:38:16 ip-148-72-206-215 sshd[31610]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:32:05 ip-148-72-206-215 sshd[31242]: Connection closed by 91.230.168.125 port 35563 [preauth]
Jan 31 14:32:05 ip-148-72-206-215 sshd[31243]: Connection closed by 91.230.168.120 port 38273 [preauth]
Jan 31 14:30:11 ip-148-72-206-215 sshd[31128]: Did not receive identification string from 91.230.168.8 port 53859
Jan 31 14:30:08 ip-148-72-206-215 sshd[31126]: Bad protocol version identification '\026\003\003\001\247\001' from 91.230.168.13 port 47181
Jan 31 14:29:50 ip-148-72-206-215 sshd[31070]: Did not receive identification string from 91.230.168.10 port 34811
Jan 31 14:29:40 ip-148-72-206-215 sshd[31069]: Did not receive identification string from 91.230.168.11 port 35779
Jan 31 14:26:17 ip-148-72-206-215 sshd[30882]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:26:17 ip-148-72-206-215 sshd[30882]: Disconnected from 91.224.92.78 port 23708 [preauth]
Jan 31 14:26:17 ip-148-72-206-215 sshd[30882]: Received disconnect from 91.224.92.78 port 23708:11: [preauth]
Jan 31 14:26:17 ip-148-72-206-215 sshd[30882]: Failed password for root from 91.224.92.78 port 23708 ssh2
Jan 31 14:26:15 ip-148-72-206-215 sshd[30882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:15 ip-148-72-206-215 sshd[30882]: Failed password for root from 91.224.92.78 port 23708 ssh2
Jan 31 14:26:14 ip-148-72-206-215 sshd[30882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:13 ip-148-72-206-215 sshd[30882]: Failed password for root from 91.224.92.78 port 23708 ssh2
Jan 31 14:26:11 ip-148-72-206-215 sshd[30882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:11 ip-148-72-206-215 sshd[30882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:26:11 ip-148-72-206-215 sshd[30882]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:26:10 ip-148-72-206-215 sshd[30874]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:26:10 ip-148-72-206-215 sshd[30874]: Disconnected from 91.224.92.78 port 23700 [preauth]
Jan 31 14:26:10 ip-148-72-206-215 sshd[30874]: Received disconnect from 91.224.92.78 port 23700:11: [preauth]
Jan 31 14:26:09 ip-148-72-206-215 sshd[30874]: Failed password for root from 91.224.92.78 port 23700 ssh2
Jan 31 14:26:08 ip-148-72-206-215 sshd[30874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:08 ip-148-72-206-215 sshd[30874]: Failed password for root from 91.224.92.78 port 23700 ssh2
Jan 31 14:26:06 ip-148-72-206-215 sshd[30874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:05 ip-148-72-206-215 sshd[30874]: Failed password for root from 91.224.92.78 port 23700 ssh2
Jan 31 14:26:04 ip-148-72-206-215 sshd[30874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:04 ip-148-72-206-215 sshd[30874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:26:04 ip-148-72-206-215 sshd[30874]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:26:02 ip-148-72-206-215 sshd[30863]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:26:02 ip-148-72-206-215 sshd[30863]: Disconnected from 91.224.92.78 port 57430 [preauth]
Jan 31 14:26:02 ip-148-72-206-215 sshd[30863]: Received disconnect from 91.224.92.78 port 57430:11: [preauth]
Jan 31 14:26:02 ip-148-72-206-215 sshd[30863]: Failed password for root from 91.224.92.78 port 57430 ssh2
Jan 31 14:26:00 ip-148-72-206-215 sshd[30863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:26:00 ip-148-72-206-215 sshd[30863]: Failed password for root from 91.224.92.78 port 57430 ssh2
Jan 31 14:25:58 ip-148-72-206-215 sshd[30863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:25:58 ip-148-72-206-215 sshd[30863]: Failed password for root from 91.224.92.78 port 57430 ssh2
Jan 31 14:25:57 ip-148-72-206-215 sshd[30863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:25:57 ip-148-72-206-215 sshd[30863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:25:57 ip-148-72-206-215 sshd[30863]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:19:56 ip-148-72-206-215 sshd[30506]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:19:56 ip-148-72-206-215 sshd[30506]: Disconnected from 45.227.254.170 port 61302 [preauth]
Jan 31 14:19:56 ip-148-72-206-215 sshd[30506]: Received disconnect from 45.227.254.170 port 61302:11: [preauth]
Jan 31 14:19:55 ip-148-72-206-215 sshd[30506]: Failed password for root from 45.227.254.170 port 61302 ssh2
Jan 31 14:19:54 ip-148-72-206-215 sshd[30506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:53 ip-148-72-206-215 sshd[30506]: Failed password for root from 45.227.254.170 port 61302 ssh2
Jan 31 14:19:51 ip-148-72-206-215 sshd[30506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:51 ip-148-72-206-215 sshd[30506]: Failed password for root from 45.227.254.170 port 61302 ssh2
Jan 31 14:19:50 ip-148-72-206-215 sshd[30506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:50 ip-148-72-206-215 sshd[30506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:19:48 ip-148-72-206-215 sshd[30496]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:19:48 ip-148-72-206-215 sshd[30496]: Disconnected from 45.227.254.170 port 15604 [preauth]
Jan 31 14:19:48 ip-148-72-206-215 sshd[30496]: Received disconnect from 45.227.254.170 port 15604:11: [preauth]
Jan 31 14:19:47 ip-148-72-206-215 sshd[30496]: Failed password for root from 45.227.254.170 port 15604 ssh2
Jan 31 14:19:46 ip-148-72-206-215 sshd[30496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:45 ip-148-72-206-215 sshd[30496]: Failed password for root from 45.227.254.170 port 15604 ssh2
Jan 31 14:19:43 ip-148-72-206-215 sshd[30496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:43 ip-148-72-206-215 sshd[30496]: Failed password for root from 45.227.254.170 port 15604 ssh2
Jan 31 14:19:41 ip-148-72-206-215 sshd[30496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:41 ip-148-72-206-215 sshd[30496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:19:39 ip-148-72-206-215 sshd[30487]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:19:39 ip-148-72-206-215 sshd[30487]: Disconnected from 45.227.254.170 port 24644 [preauth]
Jan 31 14:19:39 ip-148-72-206-215 sshd[30487]: Received disconnect from 45.227.254.170 port 24644:11: [preauth]
Jan 31 14:19:39 ip-148-72-206-215 sshd[30487]: Failed password for root from 45.227.254.170 port 24644 ssh2
Jan 31 14:19:37 ip-148-72-206-215 sshd[30487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:36 ip-148-72-206-215 sshd[30487]: Failed password for root from 45.227.254.170 port 24644 ssh2
Jan 31 14:19:35 ip-148-72-206-215 sshd[30487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:34 ip-148-72-206-215 sshd[30487]: Failed password for root from 45.227.254.170 port 24644 ssh2
Jan 31 14:19:33 ip-148-72-206-215 sshd[30487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:19:33 ip-148-72-206-215 sshd[30487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:13:29 ip-148-72-206-215 sshd[30113]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:29 ip-148-72-206-215 sshd[30113]: Disconnected from 91.224.92.78 port 59836 [preauth]
Jan 31 14:13:29 ip-148-72-206-215 sshd[30113]: Received disconnect from 91.224.92.78 port 59836:11: [preauth]
Jan 31 14:13:29 ip-148-72-206-215 sshd[30113]: Failed password for root from 91.224.92.78 port 59836 ssh2
Jan 31 14:13:27 ip-148-72-206-215 sshd[30113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:27 ip-148-72-206-215 sshd[30113]: Failed password for root from 91.224.92.78 port 59836 ssh2
Jan 31 14:13:25 ip-148-72-206-215 sshd[30113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:25 ip-148-72-206-215 sshd[30113]: Failed password for root from 91.224.92.78 port 59836 ssh2
Jan 31 14:13:23 ip-148-72-206-215 sshd[30113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:23 ip-148-72-206-215 sshd[30113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:23 ip-148-72-206-215 sshd[30113]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:13:22 ip-148-72-206-215 sshd[30100]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:22 ip-148-72-206-215 sshd[30100]: Disconnected from 91.224.92.78 port 46600 [preauth]
Jan 31 14:13:22 ip-148-72-206-215 sshd[30100]: Received disconnect from 91.224.92.78 port 46600:11: [preauth]
Jan 31 14:13:22 ip-148-72-206-215 sshd[30100]: Failed password for root from 91.224.92.78 port 46600 ssh2
Jan 31 14:13:20 ip-148-72-206-215 sshd[30100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:20 ip-148-72-206-215 sshd[30100]: Failed password for root from 91.224.92.78 port 46600 ssh2
Jan 31 14:13:18 ip-148-72-206-215 sshd[30100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:18 ip-148-72-206-215 sshd[30100]: Failed password for root from 91.224.92.78 port 46600 ssh2
Jan 31 14:13:16 ip-148-72-206-215 sshd[30100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:16 ip-148-72-206-215 sshd[30100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:16 ip-148-72-206-215 sshd[30100]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:13:15 ip-148-72-206-215 sshd[30092]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:15 ip-148-72-206-215 sshd[30092]: Disconnected from 91.224.92.78 port 20656 [preauth]
Jan 31 14:13:15 ip-148-72-206-215 sshd[30092]: Received disconnect from 91.224.92.78 port 20656:11: [preauth]
Jan 31 14:13:14 ip-148-72-206-215 sshd[30092]: Failed password for root from 91.224.92.78 port 20656 ssh2
Jan 31 14:13:12 ip-148-72-206-215 sshd[30092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:12 ip-148-72-206-215 sshd[30092]: Failed password for root from 91.224.92.78 port 20656 ssh2
Jan 31 14:13:10 ip-148-72-206-215 sshd[30092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:10 ip-148-72-206-215 sshd[30092]: Failed password for root from 91.224.92.78 port 20656 ssh2
Jan 31 14:13:08 ip-148-72-206-215 sshd[30092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:13:08 ip-148-72-206-215 sshd[30092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 14:13:07 ip-148-72-206-215 sshd[30092]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:07:32 ip-148-72-206-215 sshd[29681]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:07:32 ip-148-72-206-215 sshd[29681]: Disconnected from 45.227.254.170 port 35456 [preauth]
Jan 31 14:07:32 ip-148-72-206-215 sshd[29681]: Received disconnect from 45.227.254.170 port 35456:11: [preauth]
Jan 31 14:07:31 ip-148-72-206-215 sshd[29681]: Failed password for root from 45.227.254.170 port 35456 ssh2
Jan 31 14:07:30 ip-148-72-206-215 sshd[29681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:30 ip-148-72-206-215 sshd[29681]: Failed password for root from 45.227.254.170 port 35456 ssh2
Jan 31 14:07:28 ip-148-72-206-215 sshd[29681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:28 ip-148-72-206-215 sshd[29681]: Failed password for root from 45.227.254.170 port 35456 ssh2
Jan 31 14:07:26 ip-148-72-206-215 sshd[29681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:26 ip-148-72-206-215 sshd[29681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:07:24 ip-148-72-206-215 sshd[29672]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:07:24 ip-148-72-206-215 sshd[29672]: Disconnected from 45.227.254.170 port 35440 [preauth]
Jan 31 14:07:24 ip-148-72-206-215 sshd[29672]: Received disconnect from 45.227.254.170 port 35440:11: [preauth]
Jan 31 14:07:24 ip-148-72-206-215 sshd[29672]: Failed password for root from 45.227.254.170 port 35440 ssh2
Jan 31 14:07:22 ip-148-72-206-215 sshd[29672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:22 ip-148-72-206-215 sshd[29672]: Failed password for root from 45.227.254.170 port 35440 ssh2
Jan 31 14:07:19 ip-148-72-206-215 sshd[29672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:19 ip-148-72-206-215 sshd[29672]: Failed password for root from 45.227.254.170 port 35440 ssh2
Jan 31 14:07:17 ip-148-72-206-215 sshd[29672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:17 ip-148-72-206-215 sshd[29672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:07:16 ip-148-72-206-215 sshd[29663]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:07:16 ip-148-72-206-215 sshd[29663]: Disconnected from 45.227.254.170 port 25688 [preauth]
Jan 31 14:07:16 ip-148-72-206-215 sshd[29663]: Received disconnect from 45.227.254.170 port 25688:11: [preauth]
Jan 31 14:07:15 ip-148-72-206-215 sshd[29663]: Failed password for root from 45.227.254.170 port 25688 ssh2
Jan 31 14:07:14 ip-148-72-206-215 sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:13 ip-148-72-206-215 sshd[29663]: Failed password for root from 45.227.254.170 port 25688 ssh2
Jan 31 14:07:11 ip-148-72-206-215 sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:11 ip-148-72-206-215 sshd[29663]: Failed password for root from 45.227.254.170 port 25688 ssh2
Jan 31 14:07:09 ip-148-72-206-215 sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:07:09 ip-148-72-206-215 sshd[29663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 14:01:21 ip-148-72-206-215 sshd[29293]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:01:21 ip-148-72-206-215 sshd[29293]: Disconnected from 91.224.92.74 port 59833 [preauth]
Jan 31 14:01:21 ip-148-72-206-215 sshd[29293]: Received disconnect from 91.224.92.74 port 59833:11: [preauth]
Jan 31 14:01:21 ip-148-72-206-215 sshd[29293]: Failed password for root from 91.224.92.74 port 59833 ssh2
Jan 31 14:01:19 ip-148-72-206-215 sshd[29293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:19 ip-148-72-206-215 sshd[29293]: Failed password for root from 91.224.92.74 port 59833 ssh2
Jan 31 14:01:17 ip-148-72-206-215 sshd[29293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:17 ip-148-72-206-215 sshd[29293]: Failed password for root from 91.224.92.74 port 59833 ssh2
Jan 31 14:01:14 ip-148-72-206-215 sshd[29293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:14 ip-148-72-206-215 sshd[29293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:01:14 ip-148-72-206-215 sshd[29293]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:01:13 ip-148-72-206-215 sshd[29284]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:01:13 ip-148-72-206-215 sshd[29284]: Disconnected from 91.224.92.74 port 41642 [preauth]
Jan 31 14:01:13 ip-148-72-206-215 sshd[29284]: Received disconnect from 91.224.92.74 port 41642:11: [preauth]
Jan 31 14:01:13 ip-148-72-206-215 sshd[29284]: Failed password for root from 91.224.92.74 port 41642 ssh2
Jan 31 14:01:11 ip-148-72-206-215 sshd[29284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:11 ip-148-72-206-215 sshd[29284]: Failed password for root from 91.224.92.74 port 41642 ssh2
Jan 31 14:01:09 ip-148-72-206-215 sshd[29284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:08 ip-148-72-206-215 sshd[29284]: Failed password for root from 91.224.92.74 port 41642 ssh2
Jan 31 14:01:06 ip-148-72-206-215 sshd[29284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:06 ip-148-72-206-215 sshd[29284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:01:06 ip-148-72-206-215 sshd[29284]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 14:01:05 ip-148-72-206-215 sshd[29260]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:01:05 ip-148-72-206-215 sshd[29260]: Disconnected from 91.224.92.74 port 57846 [preauth]
Jan 31 14:01:05 ip-148-72-206-215 sshd[29260]: Received disconnect from 91.224.92.74 port 57846:11: [preauth]
Jan 31 14:01:05 ip-148-72-206-215 sshd[29260]: Failed password for root from 91.224.92.74 port 57846 ssh2
Jan 31 14:01:02 ip-148-72-206-215 sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:02 ip-148-72-206-215 sshd[29260]: Failed password for root from 91.224.92.74 port 57846 ssh2
Jan 31 14:01:00 ip-148-72-206-215 sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:01:00 ip-148-72-206-215 sshd[29260]: Failed password for root from 91.224.92.74 port 57846 ssh2
Jan 31 14:00:59 ip-148-72-206-215 sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 14:00:59 ip-148-72-206-215 sshd[29260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 14:00:59 ip-148-72-206-215 sshd[29260]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:48:39 ip-148-72-206-215 sshd[28565]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:39 ip-148-72-206-215 sshd[28565]: Disconnected from 91.224.92.54 port 29090 [preauth]
Jan 31 13:48:39 ip-148-72-206-215 sshd[28565]: Received disconnect from 91.224.92.54 port 29090:11: [preauth]
Jan 31 13:48:39 ip-148-72-206-215 sshd[28565]: Failed password for root from 91.224.92.54 port 29090 ssh2
Jan 31 13:48:37 ip-148-72-206-215 sshd[28565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:37 ip-148-72-206-215 sshd[28565]: Failed password for root from 91.224.92.54 port 29090 ssh2
Jan 31 13:48:35 ip-148-72-206-215 sshd[28565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:35 ip-148-72-206-215 sshd[28565]: Failed password for root from 91.224.92.54 port 29090 ssh2
Jan 31 13:48:32 ip-148-72-206-215 sshd[28565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:32 ip-148-72-206-215 sshd[28565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:32 ip-148-72-206-215 sshd[28565]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:48:31 ip-148-72-206-215 sshd[28556]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:31 ip-148-72-206-215 sshd[28556]: Disconnected from 91.224.92.54 port 41572 [preauth]
Jan 31 13:48:31 ip-148-72-206-215 sshd[28556]: Received disconnect from 91.224.92.54 port 41572:11: [preauth]
Jan 31 13:48:31 ip-148-72-206-215 sshd[28556]: Failed password for root from 91.224.92.54 port 41572 ssh2
Jan 31 13:48:29 ip-148-72-206-215 sshd[28556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:29 ip-148-72-206-215 sshd[28556]: Failed password for root from 91.224.92.54 port 41572 ssh2
Jan 31 13:48:27 ip-148-72-206-215 sshd[28556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:27 ip-148-72-206-215 sshd[28556]: Failed password for root from 91.224.92.54 port 41572 ssh2
Jan 31 13:48:25 ip-148-72-206-215 sshd[28556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:25 ip-148-72-206-215 sshd[28556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:24 ip-148-72-206-215 sshd[28556]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:48:23 ip-148-72-206-215 sshd[28547]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:23 ip-148-72-206-215 sshd[28547]: Disconnected from 91.224.92.54 port 36060 [preauth]
Jan 31 13:48:23 ip-148-72-206-215 sshd[28547]: Received disconnect from 91.224.92.54 port 36060:11: [preauth]
Jan 31 13:48:23 ip-148-72-206-215 sshd[28547]: Failed password for root from 91.224.92.54 port 36060 ssh2
Jan 31 13:48:21 ip-148-72-206-215 sshd[28547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:21 ip-148-72-206-215 sshd[28547]: Failed password for root from 91.224.92.54 port 36060 ssh2
Jan 31 13:48:19 ip-148-72-206-215 sshd[28547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:19 ip-148-72-206-215 sshd[28547]: Failed password for root from 91.224.92.54 port 36060 ssh2
Jan 31 13:48:17 ip-148-72-206-215 sshd[28547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:48:17 ip-148-72-206-215 sshd[28547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 13:48:17 ip-148-72-206-215 sshd[28547]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:42:35 ip-148-72-206-215 sshd[28248]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:35 ip-148-72-206-215 sshd[28248]: Disconnected from 91.224.92.108 port 47774 [preauth]
Jan 31 13:42:35 ip-148-72-206-215 sshd[28248]: Received disconnect from 91.224.92.108 port 47774:11: [preauth]
Jan 31 13:42:35 ip-148-72-206-215 sshd[28248]: Failed password for root from 91.224.92.108 port 47774 ssh2
Jan 31 13:42:34 ip-148-72-206-215 sshd[28248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:33 ip-148-72-206-215 sshd[28248]: Failed password for root from 91.224.92.108 port 47774 ssh2
Jan 31 13:42:31 ip-148-72-206-215 sshd[28248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:31 ip-148-72-206-215 sshd[28248]: Failed password for root from 91.224.92.108 port 47774 ssh2
Jan 31 13:42:29 ip-148-72-206-215 sshd[28248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:29 ip-148-72-206-215 sshd[28248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:29 ip-148-72-206-215 sshd[28248]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:42:28 ip-148-72-206-215 sshd[28240]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:28 ip-148-72-206-215 sshd[28240]: Disconnected from 91.224.92.108 port 59826 [preauth]
Jan 31 13:42:28 ip-148-72-206-215 sshd[28240]: Received disconnect from 91.224.92.108 port 59826:11: [preauth]
Jan 31 13:42:27 ip-148-72-206-215 sshd[28240]: Failed password for root from 91.224.92.108 port 59826 ssh2
Jan 31 13:42:25 ip-148-72-206-215 sshd[28240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:25 ip-148-72-206-215 sshd[28240]: Failed password for root from 91.224.92.108 port 59826 ssh2
Jan 31 13:42:23 ip-148-72-206-215 sshd[28240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:23 ip-148-72-206-215 sshd[28240]: Failed password for root from 91.224.92.108 port 59826 ssh2
Jan 31 13:42:21 ip-148-72-206-215 sshd[28240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:21 ip-148-72-206-215 sshd[28240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:21 ip-148-72-206-215 sshd[28240]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:42:20 ip-148-72-206-215 sshd[28232]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:20 ip-148-72-206-215 sshd[28232]: Disconnected from 91.224.92.108 port 55462 [preauth]
Jan 31 13:42:20 ip-148-72-206-215 sshd[28232]: Received disconnect from 91.224.92.108 port 55462:11: [preauth]
Jan 31 13:42:20 ip-148-72-206-215 sshd[28232]: Failed password for root from 91.224.92.108 port 55462 ssh2
Jan 31 13:42:18 ip-148-72-206-215 sshd[28232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:17 ip-148-72-206-215 sshd[28232]: Failed password for root from 91.224.92.108 port 55462 ssh2
Jan 31 13:42:15 ip-148-72-206-215 sshd[28232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:15 ip-148-72-206-215 sshd[28232]: Failed password for root from 91.224.92.108 port 55462 ssh2
Jan 31 13:42:14 ip-148-72-206-215 sshd[28232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:42:14 ip-148-72-206-215 sshd[28232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:42:14 ip-148-72-206-215 sshd[28232]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:36:13 ip-148-72-206-215 sshd[27899]: Disconnected from 45.148.10.147 port 13108 [preauth]
Jan 31 13:36:13 ip-148-72-206-215 sshd[27899]: Received disconnect from 45.148.10.147 port 13108:11: [preauth]
Jan 31 13:30:01 ip-148-72-206-215 sshd[27524]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:30:01 ip-148-72-206-215 sshd[27524]: Disconnected from 91.224.92.108 port 28092 [preauth]
Jan 31 13:30:01 ip-148-72-206-215 sshd[27524]: Received disconnect from 91.224.92.108 port 28092:11: [preauth]
Jan 31 13:30:00 ip-148-72-206-215 sshd[27524]: Failed password for root from 91.224.92.108 port 28092 ssh2
Jan 31 13:29:58 ip-148-72-206-215 sshd[27524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:58 ip-148-72-206-215 sshd[27524]: Failed password for root from 91.224.92.108 port 28092 ssh2
Jan 31 13:29:56 ip-148-72-206-215 sshd[27524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:56 ip-148-72-206-215 sshd[27524]: Failed password for root from 91.224.92.108 port 28092 ssh2
Jan 31 13:29:54 ip-148-72-206-215 sshd[27524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:54 ip-148-72-206-215 sshd[27524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:29:54 ip-148-72-206-215 sshd[27524]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:29:53 ip-148-72-206-215 sshd[27516]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:29:53 ip-148-72-206-215 sshd[27516]: Disconnected from 91.224.92.108 port 47768 [preauth]
Jan 31 13:29:53 ip-148-72-206-215 sshd[27516]: Received disconnect from 91.224.92.108 port 47768:11: [preauth]
Jan 31 13:29:52 ip-148-72-206-215 sshd[27516]: Failed password for root from 91.224.92.108 port 47768 ssh2
Jan 31 13:29:50 ip-148-72-206-215 sshd[27516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:50 ip-148-72-206-215 sshd[27516]: Failed password for root from 91.224.92.108 port 47768 ssh2
Jan 31 13:29:49 ip-148-72-206-215 sshd[27516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:49 ip-148-72-206-215 sshd[27516]: Failed password for root from 91.224.92.108 port 47768 ssh2
Jan 31 13:29:46 ip-148-72-206-215 sshd[27516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:46 ip-148-72-206-215 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:29:46 ip-148-72-206-215 sshd[27516]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:29:45 ip-148-72-206-215 sshd[27508]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:29:45 ip-148-72-206-215 sshd[27508]: Disconnected from 91.224.92.108 port 47742 [preauth]
Jan 31 13:29:45 ip-148-72-206-215 sshd[27508]: Received disconnect from 91.224.92.108 port 47742:11: [preauth]
Jan 31 13:29:45 ip-148-72-206-215 sshd[27508]: Failed password for root from 91.224.92.108 port 47742 ssh2
Jan 31 13:29:43 ip-148-72-206-215 sshd[27508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:43 ip-148-72-206-215 sshd[27508]: Failed password for root from 91.224.92.108 port 47742 ssh2
Jan 31 13:29:41 ip-148-72-206-215 sshd[27508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:41 ip-148-72-206-215 sshd[27508]: Failed password for root from 91.224.92.108 port 47742 ssh2
Jan 31 13:29:39 ip-148-72-206-215 sshd[27508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:29:39 ip-148-72-206-215 sshd[27508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 13:29:39 ip-148-72-206-215 sshd[27508]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:23:53 ip-148-72-206-215 sshd[27140]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:53 ip-148-72-206-215 sshd[27140]: Disconnected from 91.224.92.74 port 54146 [preauth]
Jan 31 13:23:53 ip-148-72-206-215 sshd[27140]: Received disconnect from 91.224.92.74 port 54146:11: [preauth]
Jan 31 13:23:52 ip-148-72-206-215 sshd[27140]: Failed password for root from 91.224.92.74 port 54146 ssh2
Jan 31 13:23:50 ip-148-72-206-215 sshd[27140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:50 ip-148-72-206-215 sshd[27140]: Failed password for root from 91.224.92.74 port 54146 ssh2
Jan 31 13:23:48 ip-148-72-206-215 sshd[27140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:48 ip-148-72-206-215 sshd[27140]: Failed password for root from 91.224.92.74 port 54146 ssh2
Jan 31 13:23:45 ip-148-72-206-215 sshd[27140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:45 ip-148-72-206-215 sshd[27140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:45 ip-148-72-206-215 sshd[27140]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:23:44 ip-148-72-206-215 sshd[27132]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:44 ip-148-72-206-215 sshd[27132]: Disconnected from 91.224.92.74 port 54136 [preauth]
Jan 31 13:23:44 ip-148-72-206-215 sshd[27132]: Received disconnect from 91.224.92.74 port 54136:11: [preauth]
Jan 31 13:23:43 ip-148-72-206-215 sshd[27132]: Failed password for root from 91.224.92.74 port 54136 ssh2
Jan 31 13:23:42 ip-148-72-206-215 sshd[27132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:41 ip-148-72-206-215 sshd[27132]: Failed password for root from 91.224.92.74 port 54136 ssh2
Jan 31 13:23:40 ip-148-72-206-215 sshd[27132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:39 ip-148-72-206-215 sshd[27132]: Failed password for root from 91.224.92.74 port 54136 ssh2
Jan 31 13:23:37 ip-148-72-206-215 sshd[27132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:37 ip-148-72-206-215 sshd[27132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:37 ip-148-72-206-215 sshd[27132]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:23:36 ip-148-72-206-215 sshd[27120]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:36 ip-148-72-206-215 sshd[27120]: Disconnected from 91.224.92.74 port 48064 [preauth]
Jan 31 13:23:36 ip-148-72-206-215 sshd[27120]: Received disconnect from 91.224.92.74 port 48064:11: [preauth]
Jan 31 13:23:36 ip-148-72-206-215 sshd[27120]: Failed password for root from 91.224.92.74 port 48064 ssh2
Jan 31 13:23:34 ip-148-72-206-215 sshd[27120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:33 ip-148-72-206-215 sshd[27120]: Failed password for root from 91.224.92.74 port 48064 ssh2
Jan 31 13:23:32 ip-148-72-206-215 sshd[27120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:32 ip-148-72-206-215 sshd[27120]: Failed password for root from 91.224.92.74 port 48064 ssh2
Jan 31 13:23:30 ip-148-72-206-215 sshd[27120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:23:30 ip-148-72-206-215 sshd[27120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 13:23:30 ip-148-72-206-215 sshd[27120]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:17:50 ip-148-72-206-215 sshd[26779]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:50 ip-148-72-206-215 sshd[26779]: Disconnected from 91.224.92.78 port 45282 [preauth]
Jan 31 13:17:50 ip-148-72-206-215 sshd[26779]: Received disconnect from 91.224.92.78 port 45282:11: [preauth]
Jan 31 13:17:49 ip-148-72-206-215 sshd[26779]: Failed password for root from 91.224.92.78 port 45282 ssh2
Jan 31 13:17:48 ip-148-72-206-215 sshd[26779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:47 ip-148-72-206-215 sshd[26779]: Failed password for root from 91.224.92.78 port 45282 ssh2
Jan 31 13:17:46 ip-148-72-206-215 sshd[26779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:46 ip-148-72-206-215 sshd[26779]: Failed password for root from 91.224.92.78 port 45282 ssh2
Jan 31 13:17:43 ip-148-72-206-215 sshd[26779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:43 ip-148-72-206-215 sshd[26779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:43 ip-148-72-206-215 sshd[26779]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:17:42 ip-148-72-206-215 sshd[26769]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:42 ip-148-72-206-215 sshd[26769]: Disconnected from 91.224.92.78 port 45266 [preauth]
Jan 31 13:17:42 ip-148-72-206-215 sshd[26769]: Received disconnect from 91.224.92.78 port 45266:11: [preauth]
Jan 31 13:17:42 ip-148-72-206-215 sshd[26769]: Failed password for root from 91.224.92.78 port 45266 ssh2
Jan 31 13:17:40 ip-148-72-206-215 sshd[26769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:39 ip-148-72-206-215 sshd[26769]: Failed password for root from 91.224.92.78 port 45266 ssh2
Jan 31 13:17:37 ip-148-72-206-215 sshd[26769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:37 ip-148-72-206-215 sshd[26769]: Failed password for root from 91.224.92.78 port 45266 ssh2
Jan 31 13:17:35 ip-148-72-206-215 sshd[26769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:35 ip-148-72-206-215 sshd[26769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:35 ip-148-72-206-215 sshd[26769]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:17:34 ip-148-72-206-215 sshd[26761]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:34 ip-148-72-206-215 sshd[26761]: Disconnected from 91.224.92.78 port 45102 [preauth]
Jan 31 13:17:34 ip-148-72-206-215 sshd[26761]: Received disconnect from 91.224.92.78 port 45102:11: [preauth]
Jan 31 13:17:33 ip-148-72-206-215 sshd[26761]: Failed password for root from 91.224.92.78 port 45102 ssh2
Jan 31 13:17:31 ip-148-72-206-215 sshd[26761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:31 ip-148-72-206-215 sshd[26761]: Failed password for root from 91.224.92.78 port 45102 ssh2
Jan 31 13:17:29 ip-148-72-206-215 sshd[26761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:29 ip-148-72-206-215 sshd[26761]: Failed password for root from 91.224.92.78 port 45102 ssh2
Jan 31 13:17:27 ip-148-72-206-215 sshd[26761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:17:27 ip-148-72-206-215 sshd[26761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 13:17:27 ip-148-72-206-215 sshd[26761]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 13:11:40 ip-148-72-206-215 sshd[26347]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:11:40 ip-148-72-206-215 sshd[26347]: Disconnected from 45.148.10.147 port 58816 [preauth]
Jan 31 13:11:40 ip-148-72-206-215 sshd[26347]: Received disconnect from 45.148.10.147 port 58816:11: [preauth]
Jan 31 13:11:40 ip-148-72-206-215 sshd[26347]: Failed password for root from 45.148.10.147 port 58816 ssh2
Jan 31 13:11:37 ip-148-72-206-215 sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:37 ip-148-72-206-215 sshd[26347]: Failed password for root from 45.148.10.147 port 58816 ssh2
Jan 31 13:11:35 ip-148-72-206-215 sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:35 ip-148-72-206-215 sshd[26347]: Failed password for root from 45.148.10.147 port 58816 ssh2
Jan 31 13:11:33 ip-148-72-206-215 sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:33 ip-148-72-206-215 sshd[26347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:11:31 ip-148-72-206-215 sshd[26335]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:11:31 ip-148-72-206-215 sshd[26335]: Disconnected from 45.148.10.147 port 28198 [preauth]
Jan 31 13:11:31 ip-148-72-206-215 sshd[26335]: Received disconnect from 45.148.10.147 port 28198:11: [preauth]
Jan 31 13:11:31 ip-148-72-206-215 sshd[26335]: Failed password for root from 45.148.10.147 port 28198 ssh2
Jan 31 13:11:29 ip-148-72-206-215 sshd[26335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:29 ip-148-72-206-215 sshd[26335]: Failed password for root from 45.148.10.147 port 28198 ssh2
Jan 31 13:11:27 ip-148-72-206-215 sshd[26335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:27 ip-148-72-206-215 sshd[26335]: Failed password for root from 45.148.10.147 port 28198 ssh2
Jan 31 13:11:25 ip-148-72-206-215 sshd[26335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:25 ip-148-72-206-215 sshd[26335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:11:23 ip-148-72-206-215 sshd[26326]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:11:23 ip-148-72-206-215 sshd[26326]: Disconnected from 45.148.10.147 port 28156 [preauth]
Jan 31 13:11:23 ip-148-72-206-215 sshd[26326]: Received disconnect from 45.148.10.147 port 28156:11: [preauth]
Jan 31 13:11:23 ip-148-72-206-215 sshd[26326]: Failed password for root from 45.148.10.147 port 28156 ssh2
Jan 31 13:11:21 ip-148-72-206-215 sshd[26326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:21 ip-148-72-206-215 sshd[26326]: Failed password for root from 45.148.10.147 port 28156 ssh2
Jan 31 13:11:19 ip-148-72-206-215 sshd[26326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:18 ip-148-72-206-215 sshd[26326]: Failed password for root from 45.148.10.147 port 28156 ssh2
Jan 31 13:11:17 ip-148-72-206-215 sshd[26326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 13:11:17 ip-148-72-206-215 sshd[26326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 13:05:16 ip-148-72-206-215 sshd[25871]: Disconnected from 45.148.10.147 port 34166 [preauth]
Jan 31 13:05:16 ip-148-72-206-215 sshd[25871]: Received disconnect from 45.148.10.147 port 34166:11: [preauth]
Jan 31 12:59:32 ip-148-72-206-215 sshd[25485]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:59:32 ip-148-72-206-215 sshd[25485]: Disconnected from 45.227.254.170 port 30152 [preauth]
Jan 31 12:59:32 ip-148-72-206-215 sshd[25485]: Received disconnect from 45.227.254.170 port 30152:11: [preauth]
Jan 31 12:59:32 ip-148-72-206-215 sshd[25485]: Failed password for root from 45.227.254.170 port 30152 ssh2
Jan 31 12:59:30 ip-148-72-206-215 sshd[25485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:29 ip-148-72-206-215 sshd[25485]: Failed password for root from 45.227.254.170 port 30152 ssh2
Jan 31 12:59:27 ip-148-72-206-215 sshd[25485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:27 ip-148-72-206-215 sshd[25485]: Failed password for root from 45.227.254.170 port 30152 ssh2
Jan 31 12:59:25 ip-148-72-206-215 sshd[25485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:25 ip-148-72-206-215 sshd[25485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:59:23 ip-148-72-206-215 sshd[25476]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:59:23 ip-148-72-206-215 sshd[25476]: Disconnected from 45.227.254.170 port 13156 [preauth]
Jan 31 12:59:23 ip-148-72-206-215 sshd[25476]: Received disconnect from 45.227.254.170 port 13156:11: [preauth]
Jan 31 12:59:23 ip-148-72-206-215 sshd[25476]: Failed password for root from 45.227.254.170 port 13156 ssh2
Jan 31 12:59:20 ip-148-72-206-215 sshd[25476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:20 ip-148-72-206-215 sshd[25476]: Failed password for root from 45.227.254.170 port 13156 ssh2
Jan 31 12:59:18 ip-148-72-206-215 sshd[25476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:18 ip-148-72-206-215 sshd[25476]: Failed password for root from 45.227.254.170 port 13156 ssh2
Jan 31 12:59:16 ip-148-72-206-215 sshd[25476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:16 ip-148-72-206-215 sshd[25476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:59:14 ip-148-72-206-215 sshd[25465]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:59:14 ip-148-72-206-215 sshd[25465]: Disconnected from 45.227.254.170 port 38162 [preauth]
Jan 31 12:59:14 ip-148-72-206-215 sshd[25465]: Received disconnect from 45.227.254.170 port 38162:11: [preauth]
Jan 31 12:59:14 ip-148-72-206-215 sshd[25465]: Failed password for root from 45.227.254.170 port 38162 ssh2
Jan 31 12:59:12 ip-148-72-206-215 sshd[25465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:11 ip-148-72-206-215 sshd[25465]: Failed password for root from 45.227.254.170 port 38162 ssh2
Jan 31 12:59:09 ip-148-72-206-215 sshd[25465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:09 ip-148-72-206-215 sshd[25465]: Failed password for root from 45.227.254.170 port 38162 ssh2
Jan 31 12:59:06 ip-148-72-206-215 sshd[25465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:59:06 ip-148-72-206-215 sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:47:13 ip-148-72-206-215 sshd[24839]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:47:13 ip-148-72-206-215 sshd[24839]: Disconnected from 91.224.92.78 port 51288 [preauth]
Jan 31 12:47:13 ip-148-72-206-215 sshd[24839]: Received disconnect from 91.224.92.78 port 51288:11: [preauth]
Jan 31 12:47:13 ip-148-72-206-215 sshd[24839]: Failed password for root from 91.224.92.78 port 51288 ssh2
Jan 31 12:47:10 ip-148-72-206-215 sshd[24839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:47:10 ip-148-72-206-215 sshd[24839]: Failed password for root from 91.224.92.78 port 51288 ssh2
Jan 31 12:47:09 ip-148-72-206-215 sshd[24839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:47:08 ip-148-72-206-215 sshd[24839]: Failed password for root from 91.224.92.78 port 51288 ssh2
Jan 31 12:47:07 ip-148-72-206-215 sshd[24839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:47:07 ip-148-72-206-215 sshd[24839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:47:06 ip-148-72-206-215 sshd[24839]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:47:05 ip-148-72-206-215 sshd[24830]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:47:05 ip-148-72-206-215 sshd[24830]: Disconnected from 91.224.92.78 port 33366 [preauth]
Jan 31 12:47:05 ip-148-72-206-215 sshd[24830]: Received disconnect from 91.224.92.78 port 33366:11: [preauth]
Jan 31 12:47:05 ip-148-72-206-215 sshd[24830]: Failed password for root from 91.224.92.78 port 33366 ssh2
Jan 31 12:47:03 ip-148-72-206-215 sshd[24830]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:47:03 ip-148-72-206-215 sshd[24830]: Failed password for root from 91.224.92.78 port 33366 ssh2
Jan 31 12:47:00 ip-148-72-206-215 sshd[24830]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:47:00 ip-148-72-206-215 sshd[24830]: Failed password for root from 91.224.92.78 port 33366 ssh2
Jan 31 12:46:58 ip-148-72-206-215 sshd[24830]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:46:58 ip-148-72-206-215 sshd[24830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:46:58 ip-148-72-206-215 sshd[24830]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:46:56 ip-148-72-206-215 sshd[24820]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:46:56 ip-148-72-206-215 sshd[24820]: Disconnected from 91.224.92.78 port 15102 [preauth]
Jan 31 12:46:56 ip-148-72-206-215 sshd[24820]: Received disconnect from 91.224.92.78 port 15102:11: [preauth]
Jan 31 12:46:56 ip-148-72-206-215 sshd[24820]: Failed password for root from 91.224.92.78 port 15102 ssh2
Jan 31 12:46:54 ip-148-72-206-215 sshd[24820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:46:53 ip-148-72-206-215 sshd[24820]: Failed password for root from 91.224.92.78 port 15102 ssh2
Jan 31 12:46:51 ip-148-72-206-215 sshd[24820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:46:51 ip-148-72-206-215 sshd[24820]: Failed password for root from 91.224.92.78 port 15102 ssh2
Jan 31 12:46:48 ip-148-72-206-215 sshd[24820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:46:48 ip-148-72-206-215 sshd[24820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 12:46:48 ip-148-72-206-215 sshd[24820]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:41:15 ip-148-72-206-215 sshd[24532]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:41:15 ip-148-72-206-215 sshd[24532]: Disconnected from 45.227.254.170 port 23430 [preauth]
Jan 31 12:41:15 ip-148-72-206-215 sshd[24532]: Received disconnect from 45.227.254.170 port 23430:11: [preauth]
Jan 31 12:41:15 ip-148-72-206-215 sshd[24532]: Failed password for root from 45.227.254.170 port 23430 ssh2
Jan 31 12:41:13 ip-148-72-206-215 sshd[24532]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:12 ip-148-72-206-215 sshd[24532]: Failed password for root from 45.227.254.170 port 23430 ssh2
Jan 31 12:41:11 ip-148-72-206-215 sshd[24532]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:10 ip-148-72-206-215 sshd[24532]: Failed password for root from 45.227.254.170 port 23430 ssh2
Jan 31 12:41:08 ip-148-72-206-215 sshd[24532]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:08 ip-148-72-206-215 sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:41:06 ip-148-72-206-215 sshd[24524]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:41:06 ip-148-72-206-215 sshd[24524]: Disconnected from 45.227.254.170 port 28610 [preauth]
Jan 31 12:41:06 ip-148-72-206-215 sshd[24524]: Received disconnect from 45.227.254.170 port 28610:11: [preauth]
Jan 31 12:41:06 ip-148-72-206-215 sshd[24524]: Failed password for root from 45.227.254.170 port 28610 ssh2
Jan 31 12:41:04 ip-148-72-206-215 sshd[24524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:04 ip-148-72-206-215 sshd[24524]: Failed password for root from 45.227.254.170 port 28610 ssh2
Jan 31 12:41:03 ip-148-72-206-215 sshd[24524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:02 ip-148-72-206-215 sshd[24524]: Failed password for root from 45.227.254.170 port 28610 ssh2
Jan 31 12:41:00 ip-148-72-206-215 sshd[24524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:41:00 ip-148-72-206-215 sshd[24524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:40:58 ip-148-72-206-215 sshd[24514]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:40:58 ip-148-72-206-215 sshd[24514]: Disconnected from 45.227.254.170 port 32288 [preauth]
Jan 31 12:40:58 ip-148-72-206-215 sshd[24514]: Received disconnect from 45.227.254.170 port 32288:11: [preauth]
Jan 31 12:40:58 ip-148-72-206-215 sshd[24514]: Failed password for root from 45.227.254.170 port 32288 ssh2
Jan 31 12:40:56 ip-148-72-206-215 sshd[24514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:40:56 ip-148-72-206-215 sshd[24514]: Failed password for root from 45.227.254.170 port 32288 ssh2
Jan 31 12:40:54 ip-148-72-206-215 sshd[24514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:40:53 ip-148-72-206-215 sshd[24514]: Failed password for root from 45.227.254.170 port 32288 ssh2
Jan 31 12:40:52 ip-148-72-206-215 sshd[24514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:40:52 ip-148-72-206-215 sshd[24514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 12:35:05 ip-148-72-206-215 sshd[24197]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:35:05 ip-148-72-206-215 sshd[24197]: Disconnected from 91.224.92.190 port 27388 [preauth]
Jan 31 12:35:05 ip-148-72-206-215 sshd[24197]: Received disconnect from 91.224.92.190 port 27388:11: [preauth]
Jan 31 12:35:05 ip-148-72-206-215 sshd[24197]: Failed password for root from 91.224.92.190 port 27388 ssh2
Jan 31 12:35:02 ip-148-72-206-215 sshd[24197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:35:01 ip-148-72-206-215 sshd[24197]: Failed password for root from 91.224.92.190 port 27388 ssh2
Jan 31 12:34:59 ip-148-72-206-215 sshd[24197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:59 ip-148-72-206-215 sshd[24197]: Failed password for root from 91.224.92.190 port 27388 ssh2
Jan 31 12:34:57 ip-148-72-206-215 sshd[24197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:57 ip-148-72-206-215 sshd[24197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:34:57 ip-148-72-206-215 sshd[24197]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:34:56 ip-148-72-206-215 sshd[24188]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:34:56 ip-148-72-206-215 sshd[24188]: Disconnected from 91.224.92.190 port 28924 [preauth]
Jan 31 12:34:56 ip-148-72-206-215 sshd[24188]: Received disconnect from 91.224.92.190 port 28924:11: [preauth]
Jan 31 12:34:56 ip-148-72-206-215 sshd[24188]: Failed password for root from 91.224.92.190 port 28924 ssh2
Jan 31 12:34:53 ip-148-72-206-215 sshd[24188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:53 ip-148-72-206-215 sshd[24188]: Failed password for root from 91.224.92.190 port 28924 ssh2
Jan 31 12:34:51 ip-148-72-206-215 sshd[24188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:51 ip-148-72-206-215 sshd[24188]: Failed password for root from 91.224.92.190 port 28924 ssh2
Jan 31 12:34:49 ip-148-72-206-215 sshd[24188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:49 ip-148-72-206-215 sshd[24188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:34:49 ip-148-72-206-215 sshd[24188]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:34:48 ip-148-72-206-215 sshd[24179]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:34:48 ip-148-72-206-215 sshd[24179]: Disconnected from 91.224.92.190 port 46070 [preauth]
Jan 31 12:34:48 ip-148-72-206-215 sshd[24179]: Received disconnect from 91.224.92.190 port 46070:11: [preauth]
Jan 31 12:34:47 ip-148-72-206-215 sshd[24179]: Failed password for root from 91.224.92.190 port 46070 ssh2
Jan 31 12:34:45 ip-148-72-206-215 sshd[24179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:45 ip-148-72-206-215 sshd[24179]: Failed password for root from 91.224.92.190 port 46070 ssh2
Jan 31 12:34:43 ip-148-72-206-215 sshd[24179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:42 ip-148-72-206-215 sshd[24179]: Failed password for root from 91.224.92.190 port 46070 ssh2
Jan 31 12:34:40 ip-148-72-206-215 sshd[24179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:34:40 ip-148-72-206-215 sshd[24179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 12:34:40 ip-148-72-206-215 sshd[24179]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 12:22:33 ip-148-72-206-215 sshd[23470]: Disconnected from 45.148.10.147 port 41325 [preauth]
Jan 31 12:22:33 ip-148-72-206-215 sshd[23470]: Received disconnect from 45.148.10.147 port 41325:11: [preauth]
Jan 31 12:22:05 ip-148-72-206-215 sshd[23456]: Bad protocol version identification '\026\003\001' from 3.132.23.201 port 54688
Jan 31 12:22:05 ip-148-72-206-215 sshd[23444]: Connection closed by 3.132.23.201 port 46494 [preauth]
Jan 31 12:21:47 ip-148-72-206-215 sshd[23438]: Bad protocol version identification '\026\003\001' from 3.132.23.201 port 56250
Jan 31 12:18:57 ip-148-72-206-215 sshd[23219]: Did not receive identification string from 3.132.23.201 port 55974
Jan 31 12:18:57 ip-148-72-206-215 sshd[23218]: Did not receive identification string from 3.132.23.201 port 55960
Jan 31 12:18:55 ip-148-72-206-215 sshd[23216]: Bad protocol version identification '' from 3.132.23.201 port 55938
Jan 31 12:09:08 ip-148-72-206-215 sshd[22557]: Connection reset by 205.210.31.239 port 59252 [preauth]
Jan 31 12:04:51 ip-148-72-206-215 sshd[22233]: Disconnected from 45.148.10.147 port 10129 [preauth]
Jan 31 12:04:51 ip-148-72-206-215 sshd[22233]: Received disconnect from 45.148.10.147 port 10129:11: [preauth]
Jan 31 12:04:39 ip-148-72-206-215 sshd[22219]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 12:04:39 ip-148-72-206-215 sshd[22219]: Disconnected from 45.148.10.147 port 43910 [preauth]
Jan 31 12:04:39 ip-148-72-206-215 sshd[22219]: Received disconnect from 45.148.10.147 port 43910:11: [preauth]
Jan 31 12:04:39 ip-148-72-206-215 sshd[22219]: Failed password for root from 45.148.10.147 port 43910 ssh2
Jan 31 12:04:37 ip-148-72-206-215 sshd[22219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:04:36 ip-148-72-206-215 sshd[22219]: Failed password for root from 45.148.10.147 port 43910 ssh2
Jan 31 12:04:34 ip-148-72-206-215 sshd[22219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:04:34 ip-148-72-206-215 sshd[22219]: Failed password for root from 45.148.10.147 port 43910 ssh2
Jan 31 12:04:33 ip-148-72-206-215 sshd[22219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 12:04:33 ip-148-72-206-215 sshd[22219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.147 user=root
Jan 31 11:51:09 ip-148-72-206-215 sshd[21469]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:51:09 ip-148-72-206-215 sshd[21469]: Disconnected from 91.224.92.74 port 15467 [preauth]
Jan 31 11:51:09 ip-148-72-206-215 sshd[21469]: Received disconnect from 91.224.92.74 port 15467:11: [preauth]
Jan 31 11:51:09 ip-148-72-206-215 sshd[21469]: Failed password for root from 91.224.92.74 port 15467 ssh2
Jan 31 11:51:06 ip-148-72-206-215 sshd[21469]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:51:06 ip-148-72-206-215 sshd[21469]: Failed password for root from 91.224.92.74 port 15467 ssh2
Jan 31 11:51:04 ip-148-72-206-215 sshd[21469]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:51:04 ip-148-72-206-215 sshd[21469]: Failed password for root from 91.224.92.74 port 15467 ssh2
Jan 31 11:51:01 ip-148-72-206-215 sshd[21469]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:51:01 ip-148-72-206-215 sshd[21469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:51:01 ip-148-72-206-215 sshd[21469]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:51:00 ip-148-72-206-215 sshd[21461]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:51:00 ip-148-72-206-215 sshd[21461]: Disconnected from 91.224.92.74 port 62168 [preauth]
Jan 31 11:51:00 ip-148-72-206-215 sshd[21461]: Received disconnect from 91.224.92.74 port 62168:11: [preauth]
Jan 31 11:51:00 ip-148-72-206-215 sshd[21461]: Failed password for root from 91.224.92.74 port 62168 ssh2
Jan 31 11:50:58 ip-148-72-206-215 sshd[21461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:58 ip-148-72-206-215 sshd[21461]: Failed password for root from 91.224.92.74 port 62168 ssh2
Jan 31 11:50:57 ip-148-72-206-215 sshd[21461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:56 ip-148-72-206-215 sshd[21461]: Failed password for root from 91.224.92.74 port 62168 ssh2
Jan 31 11:50:54 ip-148-72-206-215 sshd[21461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:54 ip-148-72-206-215 sshd[21461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:50:54 ip-148-72-206-215 sshd[21461]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:50:53 ip-148-72-206-215 sshd[21453]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:50:53 ip-148-72-206-215 sshd[21453]: Disconnected from 91.224.92.74 port 62164 [preauth]
Jan 31 11:50:53 ip-148-72-206-215 sshd[21453]: Received disconnect from 91.224.92.74 port 62164:11: [preauth]
Jan 31 11:50:52 ip-148-72-206-215 sshd[21453]: Failed password for root from 91.224.92.74 port 62164 ssh2
Jan 31 11:50:51 ip-148-72-206-215 sshd[21453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:51 ip-148-72-206-215 sshd[21453]: Failed password for root from 91.224.92.74 port 62164 ssh2
Jan 31 11:50:48 ip-148-72-206-215 sshd[21453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:48 ip-148-72-206-215 sshd[21453]: Failed password for root from 91.224.92.74 port 62164 ssh2
Jan 31 11:50:46 ip-148-72-206-215 sshd[21453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:50:46 ip-148-72-206-215 sshd[21453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 11:50:46 ip-148-72-206-215 sshd[21453]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:37:53 ip-148-72-206-215 sshd[20789]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:37:53 ip-148-72-206-215 sshd[20789]: Disconnected from 45.227.254.170 port 55762 [preauth]
Jan 31 11:37:53 ip-148-72-206-215 sshd[20789]: Received disconnect from 45.227.254.170 port 55762:11: [preauth]
Jan 31 11:37:52 ip-148-72-206-215 sshd[20789]: Failed password for root from 45.227.254.170 port 55762 ssh2
Jan 31 11:37:50 ip-148-72-206-215 sshd[20789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:50 ip-148-72-206-215 sshd[20789]: Failed password for root from 45.227.254.170 port 55762 ssh2
Jan 31 11:37:48 ip-148-72-206-215 sshd[20789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:47 ip-148-72-206-215 sshd[20789]: Failed password for root from 45.227.254.170 port 55762 ssh2
Jan 31 11:37:45 ip-148-72-206-215 sshd[20789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:45 ip-148-72-206-215 sshd[20789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:37:43 ip-148-72-206-215 sshd[20779]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:37:43 ip-148-72-206-215 sshd[20779]: Disconnected from 45.227.254.170 port 51652 [preauth]
Jan 31 11:37:43 ip-148-72-206-215 sshd[20779]: Received disconnect from 45.227.254.170 port 51652:11: [preauth]
Jan 31 11:37:43 ip-148-72-206-215 sshd[20779]: Failed password for root from 45.227.254.170 port 51652 ssh2
Jan 31 11:37:41 ip-148-72-206-215 sshd[20779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:41 ip-148-72-206-215 sshd[20779]: Failed password for root from 45.227.254.170 port 51652 ssh2
Jan 31 11:37:39 ip-148-72-206-215 sshd[20779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:39 ip-148-72-206-215 sshd[20779]: Failed password for root from 45.227.254.170 port 51652 ssh2
Jan 31 11:37:36 ip-148-72-206-215 sshd[20779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:36 ip-148-72-206-215 sshd[20779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:37:34 ip-148-72-206-215 sshd[20769]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:37:34 ip-148-72-206-215 sshd[20769]: Disconnected from 45.227.254.170 port 51636 [preauth]
Jan 31 11:37:34 ip-148-72-206-215 sshd[20769]: Received disconnect from 45.227.254.170 port 51636:11: [preauth]
Jan 31 11:37:34 ip-148-72-206-215 sshd[20769]: Failed password for root from 45.227.254.170 port 51636 ssh2
Jan 31 11:37:32 ip-148-72-206-215 sshd[20769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:31 ip-148-72-206-215 sshd[20769]: Failed password for root from 45.227.254.170 port 51636 ssh2
Jan 31 11:37:29 ip-148-72-206-215 sshd[20769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:29 ip-148-72-206-215 sshd[20769]: Failed password for root from 45.227.254.170 port 51636 ssh2
Jan 31 11:37:27 ip-148-72-206-215 sshd[20769]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:37:27 ip-148-72-206-215 sshd[20769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.254.170 user=root
Jan 31 11:31:15 ip-148-72-206-215 sshd[20448]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:31:15 ip-148-72-206-215 sshd[20448]: Disconnected from 195.178.110.15 port 18952 [preauth]
Jan 31 11:31:15 ip-148-72-206-215 sshd[20448]: Received disconnect from 195.178.110.15 port 18952:11: [preauth]
Jan 31 11:31:15 ip-148-72-206-215 sshd[20448]: Failed password for root from 195.178.110.15 port 18952 ssh2
Jan 31 11:31:12 ip-148-72-206-215 sshd[20448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:31:12 ip-148-72-206-215 sshd[20448]: Failed password for root from 195.178.110.15 port 18952 ssh2
Jan 31 11:31:10 ip-148-72-206-215 sshd[20448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:31:09 ip-148-72-206-215 sshd[20448]: Failed password for root from 195.178.110.15 port 18952 ssh2
Jan 31 11:31:07 ip-148-72-206-215 sshd[20448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:31:07 ip-148-72-206-215 sshd[20448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:31:05 ip-148-72-206-215 sshd[20439]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:31:05 ip-148-72-206-215 sshd[20439]: Disconnected from 195.178.110.15 port 26973 [preauth]
Jan 31 11:31:05 ip-148-72-206-215 sshd[20439]: Received disconnect from 195.178.110.15 port 26973:11: [preauth]
Jan 31 11:31:05 ip-148-72-206-215 sshd[20439]: Failed password for root from 195.178.110.15 port 26973 ssh2
Jan 31 11:31:03 ip-148-72-206-215 sshd[20439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:31:03 ip-148-72-206-215 sshd[20439]: Failed password for root from 195.178.110.15 port 26973 ssh2
Jan 31 11:31:01 ip-148-72-206-215 sshd[20439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:31:01 ip-148-72-206-215 sshd[20439]: Failed password for root from 195.178.110.15 port 26973 ssh2
Jan 31 11:30:58 ip-148-72-206-215 sshd[20439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:30:58 ip-148-72-206-215 sshd[20439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:30:56 ip-148-72-206-215 sshd[20430]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:30:56 ip-148-72-206-215 sshd[20430]: Disconnected from 195.178.110.15 port 63816 [preauth]
Jan 31 11:30:56 ip-148-72-206-215 sshd[20430]: Received disconnect from 195.178.110.15 port 63816:11: [preauth]
Jan 31 11:30:56 ip-148-72-206-215 sshd[20430]: Failed password for root from 195.178.110.15 port 63816 ssh2
Jan 31 11:30:54 ip-148-72-206-215 sshd[20430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:30:54 ip-148-72-206-215 sshd[20430]: Failed password for root from 195.178.110.15 port 63816 ssh2
Jan 31 11:30:52 ip-148-72-206-215 sshd[20430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:30:51 ip-148-72-206-215 sshd[20430]: Failed password for root from 195.178.110.15 port 63816 ssh2
Jan 31 11:30:49 ip-148-72-206-215 sshd[20430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:30:49 ip-148-72-206-215 sshd[20430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 11:13:51 ip-148-72-206-215 sshd[19452]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:51 ip-148-72-206-215 sshd[19452]: Disconnected from 91.224.92.78 port 42290 [preauth]
Jan 31 11:13:51 ip-148-72-206-215 sshd[19452]: Received disconnect from 91.224.92.78 port 42290:11: [preauth]
Jan 31 11:13:51 ip-148-72-206-215 sshd[19452]: Failed password for root from 91.224.92.78 port 42290 ssh2
Jan 31 11:13:49 ip-148-72-206-215 sshd[19452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:49 ip-148-72-206-215 sshd[19452]: Failed password for root from 91.224.92.78 port 42290 ssh2
Jan 31 11:13:47 ip-148-72-206-215 sshd[19452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:46 ip-148-72-206-215 sshd[19452]: Failed password for root from 91.224.92.78 port 42290 ssh2
Jan 31 11:13:45 ip-148-72-206-215 sshd[19452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:45 ip-148-72-206-215 sshd[19452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:44 ip-148-72-206-215 sshd[19452]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:13:43 ip-148-72-206-215 sshd[19444]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:43 ip-148-72-206-215 sshd[19444]: Disconnected from 91.224.92.78 port 44434 [preauth]
Jan 31 11:13:43 ip-148-72-206-215 sshd[19444]: Received disconnect from 91.224.92.78 port 44434:11: [preauth]
Jan 31 11:13:43 ip-148-72-206-215 sshd[19444]: Failed password for root from 91.224.92.78 port 44434 ssh2
Jan 31 11:13:41 ip-148-72-206-215 sshd[19444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:41 ip-148-72-206-215 sshd[19444]: Failed password for root from 91.224.92.78 port 44434 ssh2
Jan 31 11:13:39 ip-148-72-206-215 sshd[19444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:39 ip-148-72-206-215 sshd[19444]: Failed password for root from 91.224.92.78 port 44434 ssh2
Jan 31 11:13:37 ip-148-72-206-215 sshd[19444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:37 ip-148-72-206-215 sshd[19444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:36 ip-148-72-206-215 sshd[19444]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:13:35 ip-148-72-206-215 sshd[19435]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:35 ip-148-72-206-215 sshd[19435]: Disconnected from 91.224.92.78 port 11408 [preauth]
Jan 31 11:13:35 ip-148-72-206-215 sshd[19435]: Received disconnect from 91.224.92.78 port 11408:11: [preauth]
Jan 31 11:13:35 ip-148-72-206-215 sshd[19435]: Failed password for root from 91.224.92.78 port 11408 ssh2
Jan 31 11:13:32 ip-148-72-206-215 sshd[19435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:32 ip-148-72-206-215 sshd[19435]: Failed password for root from 91.224.92.78 port 11408 ssh2
Jan 31 11:13:30 ip-148-72-206-215 sshd[19435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:30 ip-148-72-206-215 sshd[19435]: Failed password for root from 91.224.92.78 port 11408 ssh2
Jan 31 11:13:29 ip-148-72-206-215 sshd[19435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:13:29 ip-148-72-206-215 sshd[19435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.78 user=root
Jan 31 11:13:28 ip-148-72-206-215 sshd[19435]: reverse mapping checking getaddrinfo for srv-91-224-92-78.serveroffer.net [91.224.92.78] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:07:13 ip-148-72-206-215 sshd[19066]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:07:13 ip-148-72-206-215 sshd[19066]: Disconnected from 91.224.92.108 port 20722 [preauth]
Jan 31 11:07:13 ip-148-72-206-215 sshd[19066]: Received disconnect from 91.224.92.108 port 20722:11: [preauth]
Jan 31 11:07:13 ip-148-72-206-215 sshd[19066]: Failed password for root from 91.224.92.108 port 20722 ssh2
Jan 31 11:07:11 ip-148-72-206-215 sshd[19066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:07:10 ip-148-72-206-215 sshd[19066]: Failed password for root from 91.224.92.108 port 20722 ssh2
Jan 31 11:07:09 ip-148-72-206-215 sshd[19066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:07:08 ip-148-72-206-215 sshd[19066]: Failed password for root from 91.224.92.108 port 20722 ssh2
Jan 31 11:07:06 ip-148-72-206-215 sshd[19066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:07:06 ip-148-72-206-215 sshd[19066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:07:06 ip-148-72-206-215 sshd[19066]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:07:04 ip-148-72-206-215 sshd[19057]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:07:04 ip-148-72-206-215 sshd[19057]: Disconnected from 91.224.92.108 port 62518 [preauth]
Jan 31 11:07:04 ip-148-72-206-215 sshd[19057]: Received disconnect from 91.224.92.108 port 62518:11: [preauth]
Jan 31 11:07:04 ip-148-72-206-215 sshd[19057]: Failed password for root from 91.224.92.108 port 62518 ssh2
Jan 31 11:07:03 ip-148-72-206-215 sshd[19057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:07:02 ip-148-72-206-215 sshd[19057]: Failed password for root from 91.224.92.108 port 62518 ssh2
Jan 31 11:07:00 ip-148-72-206-215 sshd[19057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:07:00 ip-148-72-206-215 sshd[19057]: Failed password for root from 91.224.92.108 port 62518 ssh2
Jan 31 11:06:58 ip-148-72-206-215 sshd[19057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:06:58 ip-148-72-206-215 sshd[19057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:06:58 ip-148-72-206-215 sshd[19057]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:06:57 ip-148-72-206-215 sshd[19049]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:06:57 ip-148-72-206-215 sshd[19049]: Disconnected from 91.224.92.108 port 62514 [preauth]
Jan 31 11:06:57 ip-148-72-206-215 sshd[19049]: Received disconnect from 91.224.92.108 port 62514:11: [preauth]
Jan 31 11:06:56 ip-148-72-206-215 sshd[19049]: Failed password for root from 91.224.92.108 port 62514 ssh2
Jan 31 11:06:54 ip-148-72-206-215 sshd[19049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:06:53 ip-148-72-206-215 sshd[19049]: Failed password for root from 91.224.92.108 port 62514 ssh2
Jan 31 11:06:52 ip-148-72-206-215 sshd[19049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:06:52 ip-148-72-206-215 sshd[19049]: Failed password for root from 91.224.92.108 port 62514 ssh2
Jan 31 11:06:50 ip-148-72-206-215 sshd[19049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:06:50 ip-148-72-206-215 sshd[19049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 11:06:50 ip-148-72-206-215 sshd[19049]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:00:40 ip-148-72-206-215 sshd[18667]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:40 ip-148-72-206-215 sshd[18667]: Disconnected from 91.224.92.54 port 14072 [preauth]
Jan 31 11:00:40 ip-148-72-206-215 sshd[18667]: Received disconnect from 91.224.92.54 port 14072:11: [preauth]
Jan 31 11:00:40 ip-148-72-206-215 sshd[18667]: Failed password for root from 91.224.92.54 port 14072 ssh2
Jan 31 11:00:38 ip-148-72-206-215 sshd[18667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:38 ip-148-72-206-215 sshd[18667]: Failed password for root from 91.224.92.54 port 14072 ssh2
Jan 31 11:00:36 ip-148-72-206-215 sshd[18667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:36 ip-148-72-206-215 sshd[18667]: Failed password for root from 91.224.92.54 port 14072 ssh2
Jan 31 11:00:34 ip-148-72-206-215 sshd[18667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:34 ip-148-72-206-215 sshd[18667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:34 ip-148-72-206-215 sshd[18667]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:00:33 ip-148-72-206-215 sshd[18658]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:33 ip-148-72-206-215 sshd[18658]: Disconnected from 91.224.92.54 port 62824 [preauth]
Jan 31 11:00:33 ip-148-72-206-215 sshd[18658]: Received disconnect from 91.224.92.54 port 62824:11: [preauth]
Jan 31 11:00:32 ip-148-72-206-215 sshd[18658]: Failed password for root from 91.224.92.54 port 62824 ssh2
Jan 31 11:00:30 ip-148-72-206-215 sshd[18658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:30 ip-148-72-206-215 sshd[18658]: Failed password for root from 91.224.92.54 port 62824 ssh2
Jan 31 11:00:28 ip-148-72-206-215 sshd[18658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:27 ip-148-72-206-215 sshd[18658]: Failed password for root from 91.224.92.54 port 62824 ssh2
Jan 31 11:00:26 ip-148-72-206-215 sshd[18658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:26 ip-148-72-206-215 sshd[18658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:26 ip-148-72-206-215 sshd[18658]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 11:00:24 ip-148-72-206-215 sshd[18649]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:24 ip-148-72-206-215 sshd[18649]: Disconnected from 91.224.92.54 port 38154 [preauth]
Jan 31 11:00:24 ip-148-72-206-215 sshd[18649]: Received disconnect from 91.224.92.54 port 38154:11: [preauth]
Jan 31 11:00:24 ip-148-72-206-215 sshd[18649]: Failed password for root from 91.224.92.54 port 38154 ssh2
Jan 31 11:00:22 ip-148-72-206-215 sshd[18649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:22 ip-148-72-206-215 sshd[18649]: Failed password for root from 91.224.92.54 port 38154 ssh2
Jan 31 11:00:19 ip-148-72-206-215 sshd[18649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:19 ip-148-72-206-215 sshd[18649]: Failed password for root from 91.224.92.54 port 38154 ssh2
Jan 31 11:00:17 ip-148-72-206-215 sshd[18649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 11:00:17 ip-148-72-206-215 sshd[18649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.54 user=root
Jan 31 11:00:17 ip-148-72-206-215 sshd[18649]: reverse mapping checking getaddrinfo for ascrl6.writeresaychooseboltsnow.com [91.224.92.54] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:54:01 ip-148-72-206-215 sshd[18302]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:54:01 ip-148-72-206-215 sshd[18302]: Disconnected from 91.224.92.190 port 24684 [preauth]
Jan 31 10:54:01 ip-148-72-206-215 sshd[18302]: Received disconnect from 91.224.92.190 port 24684:11: [preauth]
Jan 31 10:54:01 ip-148-72-206-215 sshd[18302]: Failed password for root from 91.224.92.190 port 24684 ssh2
Jan 31 10:53:59 ip-148-72-206-215 sshd[18302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:59 ip-148-72-206-215 sshd[18302]: Failed password for root from 91.224.92.190 port 24684 ssh2
Jan 31 10:53:57 ip-148-72-206-215 sshd[18302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:57 ip-148-72-206-215 sshd[18302]: Failed password for root from 91.224.92.190 port 24684 ssh2
Jan 31 10:53:55 ip-148-72-206-215 sshd[18302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:55 ip-148-72-206-215 sshd[18302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:53:55 ip-148-72-206-215 sshd[18302]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:53:54 ip-148-72-206-215 sshd[18294]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:53:54 ip-148-72-206-215 sshd[18294]: Disconnected from 91.224.92.190 port 12150 [preauth]
Jan 31 10:53:54 ip-148-72-206-215 sshd[18294]: Received disconnect from 91.224.92.190 port 12150:11: [preauth]
Jan 31 10:53:53 ip-148-72-206-215 sshd[18294]: Failed password for root from 91.224.92.190 port 12150 ssh2
Jan 31 10:53:51 ip-148-72-206-215 sshd[18294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:51 ip-148-72-206-215 sshd[18294]: Failed password for root from 91.224.92.190 port 12150 ssh2
Jan 31 10:53:49 ip-148-72-206-215 sshd[18294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:49 ip-148-72-206-215 sshd[18294]: Failed password for root from 91.224.92.190 port 12150 ssh2
Jan 31 10:53:47 ip-148-72-206-215 sshd[18294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:47 ip-148-72-206-215 sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:53:47 ip-148-72-206-215 sshd[18294]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:53:46 ip-148-72-206-215 sshd[18285]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:53:46 ip-148-72-206-215 sshd[18285]: Disconnected from 91.224.92.190 port 26946 [preauth]
Jan 31 10:53:46 ip-148-72-206-215 sshd[18285]: Received disconnect from 91.224.92.190 port 26946:11: [preauth]
Jan 31 10:53:45 ip-148-72-206-215 sshd[18285]: Failed password for root from 91.224.92.190 port 26946 ssh2
Jan 31 10:53:43 ip-148-72-206-215 sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:43 ip-148-72-206-215 sshd[18285]: Failed password for root from 91.224.92.190 port 26946 ssh2
Jan 31 10:53:41 ip-148-72-206-215 sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:41 ip-148-72-206-215 sshd[18285]: Failed password for root from 91.224.92.190 port 26946 ssh2
Jan 31 10:53:39 ip-148-72-206-215 sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:53:39 ip-148-72-206-215 sshd[18285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:53:39 ip-148-72-206-215 sshd[18285]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:47:29 ip-148-72-206-215 sshd[17941]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:29 ip-148-72-206-215 sshd[17941]: Disconnected from 91.224.92.190 port 19170 [preauth]
Jan 31 10:47:29 ip-148-72-206-215 sshd[17941]: Received disconnect from 91.224.92.190 port 19170:11: [preauth]
Jan 31 10:47:29 ip-148-72-206-215 sshd[17941]: Failed password for root from 91.224.92.190 port 19170 ssh2
Jan 31 10:47:27 ip-148-72-206-215 sshd[17941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:27 ip-148-72-206-215 sshd[17941]: Failed password for root from 91.224.92.190 port 19170 ssh2
Jan 31 10:47:24 ip-148-72-206-215 sshd[17941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:24 ip-148-72-206-215 sshd[17941]: Failed password for root from 91.224.92.190 port 19170 ssh2
Jan 31 10:47:22 ip-148-72-206-215 sshd[17941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:22 ip-148-72-206-215 sshd[17941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:22 ip-148-72-206-215 sshd[17941]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:47:21 ip-148-72-206-215 sshd[17932]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:21 ip-148-72-206-215 sshd[17932]: Disconnected from 91.224.92.190 port 17558 [preauth]
Jan 31 10:47:21 ip-148-72-206-215 sshd[17932]: Received disconnect from 91.224.92.190 port 17558:11: [preauth]
Jan 31 10:47:21 ip-148-72-206-215 sshd[17932]: Failed password for root from 91.224.92.190 port 17558 ssh2
Jan 31 10:47:19 ip-148-72-206-215 sshd[17932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:18 ip-148-72-206-215 sshd[17932]: Failed password for root from 91.224.92.190 port 17558 ssh2
Jan 31 10:47:16 ip-148-72-206-215 sshd[17932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:16 ip-148-72-206-215 sshd[17932]: Failed password for root from 91.224.92.190 port 17558 ssh2
Jan 31 10:47:14 ip-148-72-206-215 sshd[17932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:14 ip-148-72-206-215 sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:13 ip-148-72-206-215 sshd[17932]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:47:12 ip-148-72-206-215 sshd[17923]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:12 ip-148-72-206-215 sshd[17923]: Disconnected from 91.224.92.190 port 27338 [preauth]
Jan 31 10:47:12 ip-148-72-206-215 sshd[17923]: Received disconnect from 91.224.92.190 port 27338:11: [preauth]
Jan 31 10:47:12 ip-148-72-206-215 sshd[17923]: Failed password for root from 91.224.92.190 port 27338 ssh2
Jan 31 10:47:10 ip-148-72-206-215 sshd[17923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:10 ip-148-72-206-215 sshd[17923]: Failed password for root from 91.224.92.190 port 27338 ssh2
Jan 31 10:47:08 ip-148-72-206-215 sshd[17923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:08 ip-148-72-206-215 sshd[17923]: Failed password for root from 91.224.92.190 port 27338 ssh2
Jan 31 10:47:06 ip-148-72-206-215 sshd[17923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:47:06 ip-148-72-206-215 sshd[17923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.190 user=root
Jan 31 10:47:05 ip-148-72-206-215 sshd[17923]: reverse mapping checking getaddrinfo for srv-91-224-92-190.serveroffer.net [91.224.92.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:40:56 ip-148-72-206-215 sshd[17606]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:40:56 ip-148-72-206-215 sshd[17606]: Disconnected from 195.178.110.15 port 11274 [preauth]
Jan 31 10:40:56 ip-148-72-206-215 sshd[17606]: Received disconnect from 195.178.110.15 port 11274:11: [preauth]
Jan 31 10:40:55 ip-148-72-206-215 sshd[17606]: Failed password for root from 195.178.110.15 port 11274 ssh2
Jan 31 10:40:54 ip-148-72-206-215 sshd[17606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:53 ip-148-72-206-215 sshd[17606]: Failed password for root from 195.178.110.15 port 11274 ssh2
Jan 31 10:40:51 ip-148-72-206-215 sshd[17606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:51 ip-148-72-206-215 sshd[17606]: Failed password for root from 195.178.110.15 port 11274 ssh2
Jan 31 10:40:49 ip-148-72-206-215 sshd[17606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:49 ip-148-72-206-215 sshd[17606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:40:47 ip-148-72-206-215 sshd[17594]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:40:47 ip-148-72-206-215 sshd[17594]: Disconnected from 195.178.110.15 port 63174 [preauth]
Jan 31 10:40:47 ip-148-72-206-215 sshd[17594]: Received disconnect from 195.178.110.15 port 63174:11: [preauth]
Jan 31 10:40:47 ip-148-72-206-215 sshd[17594]: Failed password for root from 195.178.110.15 port 63174 ssh2
Jan 31 10:40:45 ip-148-72-206-215 sshd[17594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:45 ip-148-72-206-215 sshd[17594]: Failed password for root from 195.178.110.15 port 63174 ssh2
Jan 31 10:40:43 ip-148-72-206-215 sshd[17594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:43 ip-148-72-206-215 sshd[17594]: Failed password for root from 195.178.110.15 port 63174 ssh2
Jan 31 10:40:40 ip-148-72-206-215 sshd[17594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:40 ip-148-72-206-215 sshd[17594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:40:39 ip-148-72-206-215 sshd[17585]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:40:39 ip-148-72-206-215 sshd[17585]: Disconnected from 195.178.110.15 port 51796 [preauth]
Jan 31 10:40:39 ip-148-72-206-215 sshd[17585]: Received disconnect from 195.178.110.15 port 51796:11: [preauth]
Jan 31 10:40:39 ip-148-72-206-215 sshd[17585]: Failed password for root from 195.178.110.15 port 51796 ssh2
Jan 31 10:40:37 ip-148-72-206-215 sshd[17585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:37 ip-148-72-206-215 sshd[17585]: Failed password for root from 195.178.110.15 port 51796 ssh2
Jan 31 10:40:34 ip-148-72-206-215 sshd[17585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:34 ip-148-72-206-215 sshd[17585]: Failed password for root from 195.178.110.15 port 51796 ssh2
Jan 31 10:40:32 ip-148-72-206-215 sshd[17585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:40:32 ip-148-72-206-215 sshd[17585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.178.110.15 user=root
Jan 31 10:39:01 ip-148-72-206-215 sshd[17482]: Connection closed by 162.142.125.197 port 26638 [preauth]
Jan 31 10:34:41 ip-148-72-206-215 sshd[17266]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:41 ip-148-72-206-215 sshd[17266]: Disconnected from 91.224.92.74 port 29338 [preauth]
Jan 31 10:34:41 ip-148-72-206-215 sshd[17266]: Received disconnect from 91.224.92.74 port 29338:11: [preauth]
Jan 31 10:34:40 ip-148-72-206-215 sshd[17266]: Failed password for root from 91.224.92.74 port 29338 ssh2
Jan 31 10:34:39 ip-148-72-206-215 sshd[17266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:39 ip-148-72-206-215 sshd[17266]: Failed password for root from 91.224.92.74 port 29338 ssh2
Jan 31 10:34:36 ip-148-72-206-215 sshd[17266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:36 ip-148-72-206-215 sshd[17266]: Failed password for root from 91.224.92.74 port 29338 ssh2
Jan 31 10:34:34 ip-148-72-206-215 sshd[17266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:34 ip-148-72-206-215 sshd[17266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:34 ip-148-72-206-215 sshd[17266]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:34:32 ip-148-72-206-215 sshd[17255]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:32 ip-148-72-206-215 sshd[17255]: Disconnected from 91.224.92.74 port 29322 [preauth]
Jan 31 10:34:32 ip-148-72-206-215 sshd[17255]: Received disconnect from 91.224.92.74 port 29322:11: [preauth]
Jan 31 10:34:32 ip-148-72-206-215 sshd[17255]: Failed password for root from 91.224.92.74 port 29322 ssh2
Jan 31 10:34:30 ip-148-72-206-215 sshd[17255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:30 ip-148-72-206-215 sshd[17255]: Failed password for root from 91.224.92.74 port 29322 ssh2
Jan 31 10:34:28 ip-148-72-206-215 sshd[17255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:28 ip-148-72-206-215 sshd[17255]: Failed password for root from 91.224.92.74 port 29322 ssh2
Jan 31 10:34:27 ip-148-72-206-215 sshd[17255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:27 ip-148-72-206-215 sshd[17255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:26 ip-148-72-206-215 sshd[17255]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:34:25 ip-148-72-206-215 sshd[17246]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:25 ip-148-72-206-215 sshd[17246]: Disconnected from 91.224.92.74 port 45916 [preauth]
Jan 31 10:34:25 ip-148-72-206-215 sshd[17246]: Received disconnect from 91.224.92.74 port 45916:11: [preauth]
Jan 31 10:34:25 ip-148-72-206-215 sshd[17246]: Failed password for root from 91.224.92.74 port 45916 ssh2
Jan 31 10:34:23 ip-148-72-206-215 sshd[17246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:23 ip-148-72-206-215 sshd[17246]: Failed password for root from 91.224.92.74 port 45916 ssh2
Jan 31 10:34:20 ip-148-72-206-215 sshd[17246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:20 ip-148-72-206-215 sshd[17246]: Failed password for root from 91.224.92.74 port 45916 ssh2
Jan 31 10:34:18 ip-148-72-206-215 sshd[17246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:34:18 ip-148-72-206-215 sshd[17246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.74 user=root
Jan 31 10:34:18 ip-148-72-206-215 sshd[17246]: reverse mapping checking getaddrinfo for srv-91-224-92-74.serveroffer.net [91.224.92.74] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:22:35 ip-148-72-206-215 sshd[16607]: ssh_dispatch_run_fatal: Connection from 165.154.173.141 port 49494: incomplete message [preauth]
Jan 31 10:22:35 ip-148-72-206-215 sshd[16607]: invalid public DH value: >= p-1 [preauth]
Jan 31 10:22:34 ip-148-72-206-215 sshd[16603]: Connection closed by 165.154.173.141 port 48878 [preauth]
Jan 31 10:22:33 ip-148-72-206-215 sshd[16602]: Did not receive identification string from 165.154.173.141 port 48442
Jan 31 10:21:34 ip-148-72-206-215 sshd[16538]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 10:21:34 ip-148-72-206-215 sshd[16538]: Disconnected from 91.224.92.108 port 43516 [preauth]
Jan 31 10:21:34 ip-148-72-206-215 sshd[16538]: Received disconnect from 91.224.92.108 port 43516:11: [preauth]
Jan 31 10:21:33 ip-148-72-206-215 sshd[16538]: Failed password for root from 91.224.92.108 port 43516 ssh2
Jan 31 10:21:32 ip-148-72-206-215 sshd[16538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:21:32 ip-148-72-206-215 sshd[16538]: Failed password for root from 91.224.92.108 port 43516 ssh2
Jan 31 10:21:29 ip-148-72-206-215 sshd[16538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:21:29 ip-148-72-206-215 sshd[16538]: Failed password for root from 91.224.92.108 port 43516 ssh2
Jan 31 10:21:27 ip-148-72-206-215 sshd[16538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:21:27 ip-148-72-206-215 sshd[16538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 10:21:27 ip-148-72-206-215 sshd[16538]: reverse mapping checking getaddrinfo for srv-91-224-92-108.serveroffer.net [91.224.92.108] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 31 10:21:26 ip-148-72-206-215 sshd[16528]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root
Jan 31 10:21:26 ip-148-72-206-215 sshd[16528]: Disconnected from 91.224.92.108 port 45932 [preauth]
Jan 31 10:21:26 ip-148-72-206-215 sshd[16528]: Received disconnect from 91.224.92.108 port 45932:11: [preauth]
Jan 31 10:21:25 ip-148-72-206-215 sshd[16528]: Failed password for root from 91.224.92.108 port 45932 ssh2
Jan 31 10:21:23 ip-148-72-206-215 sshd[16528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:21:23 ip-148-72-206-215 sshd[16528]: Failed password for root from 91.224.92.108 port 45932 ssh2
Jan 31 10:21:21 ip-148-72-206-215 sshd[16528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan 31 10:21:21 ip-148-72-206-215 sshd[16528]: Failed password for root from 91.224.92.108 port 45932 ssh2
Jan 31 10:21:18 ip-148-72-206-215 sshd[16528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"