1.25.221 port 47302 ssh2 Apr 25 01:55:44 149-210-165-102 sshd[10674]: Received disconnect from 117.31.25.221: 11: Bye Bye Apr 25 01:55:45 149-210-165-102 sshd[10675]: Failed password for invalid user shoutcast from 164.155.65.180 port 47334 ssh2 Apr 25 01:55:46 149-210-165-102 sshd[10677]: Received disconnect from 164.155.65.180: 11: Bye Bye Apr 25 01:55:59 149-210-165-102 sshd[10683]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:55:59 149-210-165-102 sshd[10683]: Invalid user ultrix from 186.206.157.74 Apr 25 01:55:59 149-210-165-102 sshd[10685]: input_userauth_request: invalid user ultrix Apr 25 01:55:59 149-210-165-102 sshd[10683]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:55:59 149-210-165-102 sshd[10683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 01:56:01 149-210-165-102 sshd[10683]: Failed password for invalid user ultrix from 186.206.157.74 port 7388 ssh2 Apr 25 01:56:01 149-210-165-102 sshd[10685]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 01:56:03 149-210-165-102 sshd[10687]: Invalid user liam from 49.73.43.231 Apr 25 01:56:03 149-210-165-102 sshd[10689]: input_userauth_request: invalid user liam Apr 25 01:56:03 149-210-165-102 sshd[10687]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:03 149-210-165-102 sshd[10687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.43.231 Apr 25 01:56:05 149-210-165-102 sshd[10687]: Failed password for invalid user liam from 49.73.43.231 port 51916 ssh2 Apr 25 01:56:05 149-210-165-102 sshd[10689]: Received disconnect from 49.73.43.231: 11: Bye Bye Apr 25 01:56:34 149-210-165-102 sshd[10709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=ftp Apr 25 01:56:35 149-210-165-102 sshd[10711]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:56:35 149-210-165-102 sshd[10711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 01:56:35 149-210-165-102 sshd[10709]: Failed password for ftp from 47.254.179.224 port 60720 ssh2 Apr 25 01:56:35 149-210-165-102 sshd[10710]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 01:56:36 149-210-165-102 sshd[10714]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:56:36 149-210-165-102 sshd[10714]: Invalid user demo from 186.210.115.15 Apr 25 01:56:36 149-210-165-102 sshd[10716]: input_userauth_request: invalid user demo Apr 25 01:56:36 149-210-165-102 sshd[10714]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:36 149-210-165-102 sshd[10714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 01:56:36 149-210-165-102 sshd[10711]: Failed password for root from 177.134.160.29 port 59446 ssh2 Apr 25 01:56:37 149-210-165-102 sshd[10712]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 01:56:37 149-210-165-102 sshd[10717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.75.83.66 user=root Apr 25 01:56:37 149-210-165-102 sshd[10713]: Invalid user shop from 121.5.166.237 Apr 25 01:56:37 149-210-165-102 sshd[10715]: input_userauth_request: invalid user shop Apr 25 01:56:37 149-210-165-102 sshd[10713]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:37 149-210-165-102 sshd[10713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 01:56:38 149-210-165-102 sshd[10714]: Failed password for invalid user demo from 186.210.115.15 port 51994 ssh2 Apr 25 01:56:38 149-210-165-102 sshd[10716]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 01:56:39 149-210-165-102 sshd[10717]: Failed password for root from 159.75.83.66 port 57204 ssh2 Apr 25 01:56:39 149-210-165-102 sshd[10713]: Failed password for invalid user shop from 121.5.166.237 port 48874 ssh2 Apr 25 01:56:39 149-210-165-102 sshd[10718]: Received disconnect from 159.75.83.66: 11: Bye Bye Apr 25 01:56:39 149-210-165-102 sshd[10715]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 01:56:43 149-210-165-102 sshd[10719]: reverse mapping checking getaddrinfo for 221.25.31.117.broad.np.fj.dynamic.163data.com.cn [117.31.25.221] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:56:43 149-210-165-102 sshd[10719]: Invalid user mmm from 117.31.25.221 Apr 25 01:56:43 149-210-165-102 sshd[10721]: input_userauth_request: invalid user mmm Apr 25 01:56:43 149-210-165-102 sshd[10719]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:43 149-210-165-102 sshd[10719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.31.25.221 Apr 25 01:56:44 149-210-165-102 sshd[10723]: Invalid user samet from 42.192.146.179 Apr 25 01:56:44 149-210-165-102 sshd[10724]: input_userauth_request: invalid user samet Apr 25 01:56:44 149-210-165-102 sshd[10723]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:44 149-210-165-102 sshd[10723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.146.179 Apr 25 01:56:45 149-210-165-102 sshd[10719]: Failed password for invalid user mmm from 117.31.25.221 port 57338 ssh2 Apr 25 01:56:45 149-210-165-102 sshd[10721]: Received disconnect from 117.31.25.221: 11: Bye Bye Apr 25 01:56:46 149-210-165-102 sshd[10731]: Invalid user admin from 45.146.164.150 Apr 25 01:56:46 149-210-165-102 sshd[10732]: input_userauth_request: invalid user admin Apr 25 01:56:46 149-210-165-102 sshd[10731]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:46 149-210-165-102 sshd[10731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.146.164.150 Apr 25 01:56:46 149-210-165-102 sshd[10723]: Failed password for invalid user samet from 42.192.146.179 port 34102 ssh2 Apr 25 01:56:47 149-210-165-102 sshd[10729]: Invalid user courtney from 106.13.244.44 Apr 25 01:56:47 149-210-165-102 sshd[10730]: input_userauth_request: invalid user courtney Apr 25 01:56:47 149-210-165-102 sshd[10729]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:47 149-210-165-102 sshd[10729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.244.44 Apr 25 01:56:47 149-210-165-102 sshd[10724]: Received disconnect from 42.192.146.179: 11: Bye Bye Apr 25 01:56:47 149-210-165-102 sshd[10731]: Failed password for invalid user admin from 45.146.164.150 port 32462 ssh2 Apr 25 01:56:47 149-210-165-102 sshd[10732]: Received disconnect from 45.146.164.150: 11: Client disconnecting normally Apr 25 01:56:48 149-210-165-102 sshd[10729]: Failed password for invalid user courtney from 106.13.244.44 port 47762 ssh2 Apr 25 01:56:48 149-210-165-102 sshd[10730]: Received disconnect from 106.13.244.44: 11: Bye Bye Apr 25 01:56:49 149-210-165-102 sshd[10734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.241.143 user=root Apr 25 01:56:51 149-210-165-102 sshd[10738]: Invalid user lin from 117.254.186.98 Apr 25 01:56:51 149-210-165-102 sshd[10739]: input_userauth_request: invalid user lin Apr 25 01:56:51 149-210-165-102 sshd[10738]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:51 149-210-165-102 sshd[10738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98 Apr 25 01:56:51 149-210-165-102 sshd[10734]: Failed password for root from 148.70.241.143 port 39610 ssh2 Apr 25 01:56:52 149-210-165-102 sshd[10735]: Received disconnect from 148.70.241.143: 11: Bye Bye Apr 25 01:56:53 149-210-165-102 sshd[10738]: Failed password for invalid user lin from 117.254.186.98 port 42176 ssh2 Apr 25 01:56:53 149-210-165-102 sshd[10739]: Received disconnect from 117.254.186.98: 11: Bye Bye Apr 25 01:56:58 149-210-165-102 sshd[10740]: Invalid user admin8 from 124.156.219.28 Apr 25 01:56:58 149-210-165-102 sshd[10741]: input_userauth_request: invalid user admin8 Apr 25 01:56:58 149-210-165-102 sshd[10740]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:56:58 149-210-165-102 sshd[10740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.219.28 Apr 25 01:56:59 149-210-165-102 sshd[10740]: Failed password for invalid user admin8 from 124.156.219.28 port 48434 ssh2 Apr 25 01:56:59 149-210-165-102 sshd[10741]: Received disconnect from 124.156.219.28: 11: Bye Bye Apr 25 01:57:00 149-210-165-102 sshd[10745]: Invalid user mk from 117.195.158.81 Apr 25 01:57:00 149-210-165-102 sshd[10746]: input_userauth_request: invalid user mk Apr 25 01:57:00 149-210-165-102 sshd[10745]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:57:00 149-210-165-102 sshd[10745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.195.158.81 Apr 25 01:57:02 149-210-165-102 sshd[10751]: Invalid user lzhang from 199.195.252.236 Apr 25 01:57:02 149-210-165-102 sshd[10752]: input_userauth_request: invalid user lzhang Apr 25 01:57:02 149-210-165-102 sshd[10751]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:57:02 149-210-165-102 sshd[10751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 01:57:02 149-210-165-102 sshd[10753]: Invalid user admin from 45.146.164.150 Apr 25 01:57:02 149-210-165-102 sshd[10754]: input_userauth_request: invalid user admin Apr 25 01:57:02 149-210-165-102 sshd[10753]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:57:02 149-210-165-102 sshd[10753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.146.164.150 Apr 25 01:57:02 149-210-165-102 sshd[10745]: Failed password for invalid user mk from 117.195.158.81 port 43246 ssh2 Apr 25 01:57:03 149-210-165-102 sshd[10746]: Received disconnect from 117.195.158.81: 11: Bye Bye Apr 25 01:57:04 149-210-165-102 sshd[10751]: Failed password for invalid user lzhang from 199.195.252.236 port 47654 ssh2 Apr 25 01:57:05 149-210-165-102 sshd[10752]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 01:57:05 149-210-165-102 sshd[10753]: Failed password for invalid user admin from 45.146.164.150 port 45204 ssh2 Apr 25 01:57:05 149-210-165-102 sshd[10754]: Received disconnect from 45.146.164.150: 11: Client disconnecting normally Apr 25 01:57:22 149-210-165-102 sshd[10767]: Did not receive identification string from 45.248.68.206 Apr 25 01:57:39 149-210-165-102 sshd[10773]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:57:39 149-210-165-102 sshd[10773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 01:57:41 149-210-165-102 sshd[10773]: Failed password for root from 186.206.157.74 port 11525 ssh2 Apr 25 01:57:41 149-210-165-102 sshd[10774]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 01:57:46 149-210-165-102 sshd[10778]: reverse mapping checking getaddrinfo for 221.25.31.117.broad.np.fj.dynamic.163data.com.cn [117.31.25.221] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:57:46 149-210-165-102 sshd[10778]: Invalid user amolah from 117.31.25.221 Apr 25 01:57:46 149-210-165-102 sshd[10779]: input_userauth_request: invalid user amolah Apr 25 01:57:46 149-210-165-102 sshd[10778]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:57:46 149-210-165-102 sshd[10778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.31.25.221 Apr 25 01:57:48 149-210-165-102 sshd[10778]: Failed password for invalid user amolah from 117.31.25.221 port 39144 ssh2 Apr 25 01:57:48 149-210-165-102 sshd[10779]: Received disconnect from 117.31.25.221: 11: Bye Bye Apr 25 01:58:08 149-210-165-102 sshd[10797]: Invalid user leah from 159.75.83.66 Apr 25 01:58:08 149-210-165-102 sshd[10799]: input_userauth_request: invalid user leah Apr 25 01:58:08 149-210-165-102 sshd[10797]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:08 149-210-165-102 sshd[10797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.75.83.66 Apr 25 01:58:10 149-210-165-102 sshd[10797]: Failed password for invalid user leah from 159.75.83.66 port 52420 ssh2 Apr 25 01:58:11 149-210-165-102 sshd[10799]: Received disconnect from 159.75.83.66: 11: Bye Bye Apr 25 01:58:17 149-210-165-102 sshd[10805]: Invalid user test from 42.192.146.179 Apr 25 01:58:17 149-210-165-102 sshd[10807]: input_userauth_request: invalid user test Apr 25 01:58:17 149-210-165-102 sshd[10805]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:17 149-210-165-102 sshd[10805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.146.179 Apr 25 01:58:19 149-210-165-102 sshd[10805]: Failed password for invalid user test from 42.192.146.179 port 58252 ssh2 Apr 25 01:58:19 149-210-165-102 sshd[10807]: Received disconnect from 42.192.146.179: 11: Bye Bye Apr 25 01:58:21 149-210-165-102 sshd[10804]: Invalid user ts from 129.146.140.161 Apr 25 01:58:21 149-210-165-102 sshd[10806]: input_userauth_request: invalid user ts Apr 25 01:58:21 149-210-165-102 sshd[10804]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:21 149-210-165-102 sshd[10804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 01:58:23 149-210-165-102 sshd[10804]: Failed password for invalid user ts from 129.146.140.161 port 50824 ssh2 Apr 25 01:58:24 149-210-165-102 sshd[10806]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 01:58:29 149-210-165-102 sshd[10813]: Invalid user memcache from 119.28.61.47 Apr 25 01:58:29 149-210-165-102 sshd[10814]: input_userauth_request: invalid user memcache Apr 25 01:58:29 149-210-165-102 sshd[10813]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:29 149-210-165-102 sshd[10813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 01:58:31 149-210-165-102 sshd[10813]: Failed password for invalid user memcache from 119.28.61.47 port 33390 ssh2 Apr 25 01:58:31 149-210-165-102 sshd[10817]: Invalid user admin from 49.73.43.231 Apr 25 01:58:31 149-210-165-102 sshd[10818]: input_userauth_request: invalid user admin Apr 25 01:58:31 149-210-165-102 sshd[10817]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:31 149-210-165-102 sshd[10817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.43.231 Apr 25 01:58:33 149-210-165-102 sshd[10817]: Failed password for invalid user admin from 49.73.43.231 port 42368 ssh2 Apr 25 01:58:34 149-210-165-102 sshd[10818]: Received disconnect from 49.73.43.231: 11: Bye Bye Apr 25 01:58:35 149-210-165-102 sshd[10814]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 01:58:37 149-210-165-102 sshd[10825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98 user=root Apr 25 01:58:39 149-210-165-102 sshd[10825]: Failed password for root from 117.254.186.98 port 56456 ssh2 Apr 25 01:58:39 149-210-165-102 sshd[10826]: Received disconnect from 117.254.186.98: 11: Bye Bye Apr 25 01:58:41 149-210-165-102 sshd[10829]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:58:41 149-210-165-102 sshd[10829]: Invalid user hadoop from 186.210.115.15 Apr 25 01:58:41 149-210-165-102 sshd[10830]: input_userauth_request: invalid user hadoop Apr 25 01:58:41 149-210-165-102 sshd[10829]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:41 149-210-165-102 sshd[10829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 01:58:44 149-210-165-102 sshd[10829]: Failed password for invalid user hadoop from 186.210.115.15 port 54502 ssh2 Apr 25 01:58:44 149-210-165-102 sshd[10830]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 01:58:46 149-210-165-102 sshd[10834]: Invalid user admin from 45.146.164.150 Apr 25 01:58:46 149-210-165-102 sshd[10835]: input_userauth_request: invalid user admin Apr 25 01:58:46 149-210-165-102 sshd[10834]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:46 149-210-165-102 sshd[10834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.146.164.150 Apr 25 01:58:48 149-210-165-102 sshd[10834]: Failed password for invalid user admin from 45.146.164.150 port 3112 ssh2 Apr 25 01:58:48 149-210-165-102 sshd[10835]: Received disconnect from 45.146.164.150: 11: Client disconnecting normally Apr 25 01:58:49 149-210-165-102 sshd[10839]: Invalid user ssw from 199.195.252.236 Apr 25 01:58:49 149-210-165-102 sshd[10840]: input_userauth_request: invalid user ssw Apr 25 01:58:49 149-210-165-102 sshd[10839]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:49 149-210-165-102 sshd[10839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 01:58:51 149-210-165-102 sshd[10837]: reverse mapping checking getaddrinfo for 221.25.31.117.broad.np.fj.dynamic.163data.com.cn [117.31.25.221] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:58:51 149-210-165-102 sshd[10837]: Invalid user benson from 117.31.25.221 Apr 25 01:58:51 149-210-165-102 sshd[10838]: input_userauth_request: invalid user benson Apr 25 01:58:51 149-210-165-102 sshd[10837]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:58:51 149-210-165-102 sshd[10837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.31.25.221 Apr 25 01:58:51 149-210-165-102 sshd[10839]: Failed password for invalid user ssw from 199.195.252.236 port 52536 ssh2 Apr 25 01:58:51 149-210-165-102 sshd[10840]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 01:58:53 149-210-165-102 sshd[10837]: Failed password for invalid user benson from 117.31.25.221 port 49182 ssh2 Apr 25 01:58:54 149-210-165-102 sshd[10838]: Received disconnect from 117.31.25.221: 11: Bye Bye Apr 25 01:59:03 149-210-165-102 sshd[10851]: Did not receive identification string from 124.235.138.174 Apr 25 01:59:03 149-210-165-102 sshd[10852]: Did not receive identification string from 112.193.170.84 Apr 25 01:59:04 149-210-165-102 sshd[10855]: Did not receive identification string from 121.237.169.227 Apr 25 01:59:10 149-210-165-102 sshd[10857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.244.44 user=root Apr 25 01:59:13 149-210-165-102 sshd[10857]: Failed password for root from 106.13.244.44 port 56478 ssh2 Apr 25 01:59:13 149-210-165-102 sshd[10858]: Received disconnect from 106.13.244.44: 11: Bye Bye Apr 25 01:59:18 149-210-165-102 sshd[10861]: Invalid user lb from 124.156.219.28 Apr 25 01:59:18 149-210-165-102 sshd[10862]: input_userauth_request: invalid user lb Apr 25 01:59:18 149-210-165-102 sshd[10861]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:59:18 149-210-165-102 sshd[10861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.219.28 Apr 25 01:59:19 149-210-165-102 sshd[10861]: Failed password for invalid user lb from 124.156.219.28 port 59228 ssh2 Apr 25 01:59:20 149-210-165-102 sshd[10862]: Received disconnect from 124.156.219.28: 11: Bye Bye Apr 25 01:59:23 149-210-165-102 sshd[10863]: Address 164.155.65.180 maps to ns1648.ztomy.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 01:59:23 149-210-165-102 sshd[10863]: Invalid user info from 164.155.65.180 Apr 25 01:59:23 149-210-165-102 sshd[10864]: input_userauth_request: invalid user info Apr 25 01:59:23 149-210-165-102 sshd[10863]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:59:23 149-210-165-102 sshd[10863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.155.65.180 Apr 25 01:59:24 149-210-165-102 sshd[10863]: Failed password for invalid user info from 164.155.65.180 port 56418 ssh2 Apr 25 01:59:25 149-210-165-102 sshd[10864]: Received disconnect from 164.155.65.180: 11: Bye Bye Apr 25 01:59:29 149-210-165-102 sshd[10872]: Connection closed by 186.206.157.74 Apr 25 01:59:30 149-210-165-102 sshd[10870]: Invalid user suporte from 47.254.179.224 Apr 25 01:59:30 149-210-165-102 sshd[10871]: input_userauth_request: invalid user suporte Apr 25 01:59:30 149-210-165-102 sshd[10870]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:59:30 149-210-165-102 sshd[10870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 01:59:32 149-210-165-102 sshd[10870]: Failed password for invalid user suporte from 47.254.179.224 port 43388 ssh2 Apr 25 01:59:32 149-210-165-102 sshd[10871]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 01:59:34 149-210-165-102 sshd[10876]: Invalid user server from 45.248.68.206 Apr 25 01:59:34 149-210-165-102 sshd[10877]: input_userauth_request: invalid user server Apr 25 01:59:34 149-210-165-102 sshd[10876]: pam_unix(sshd:auth): check pass; user unknown Apr 25 01:59:34 149-210-165-102 sshd[10876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 01:59:37 149-210-165-102 sshd[10876]: Failed password for invalid user server from 45.248.68.206 port 43116 ssh2 Apr 25 01:59:38 149-210-165-102 sshd[10877]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:00:04 149-210-165-102 sshd[10892]: Invalid user oracle from 121.5.166.237 Apr 25 02:00:04 149-210-165-102 sshd[10893]: input_userauth_request: invalid user oracle Apr 25 02:00:04 149-210-165-102 sshd[10892]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:00:04 149-210-165-102 sshd[10892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:00:07 149-210-165-102 sshd[10892]: Failed password for invalid user oracle from 121.5.166.237 port 56980 ssh2 Apr 25 02:00:09 149-210-165-102 sshd[10893]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:00:31 149-210-165-102 sshd[10935]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:00:31 149-210-165-102 sshd[10935]: Invalid user lia from 122.252.231.138 Apr 25 02:00:31 149-210-165-102 sshd[10936]: input_userauth_request: invalid user lia Apr 25 02:00:31 149-210-165-102 sshd[10935]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:00:31 149-210-165-102 sshd[10935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:00:33 149-210-165-102 sshd[10935]: Failed password for invalid user lia from 122.252.231.138 port 42032 ssh2 Apr 25 02:00:33 149-210-165-102 sshd[10936]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:00:38 149-210-165-102 sshd[10939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:00:40 149-210-165-102 sshd[10939]: Failed password for root from 199.195.252.236 port 57422 ssh2 Apr 25 02:00:40 149-210-165-102 sshd[10940]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:00:48 149-210-165-102 sshd[10946]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:00:48 149-210-165-102 sshd[10946]: Invalid user guang from 186.210.115.15 Apr 25 02:00:48 149-210-165-102 sshd[10947]: input_userauth_request: invalid user guang Apr 25 02:00:48 149-210-165-102 sshd[10946]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:00:48 149-210-165-102 sshd[10946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:00:51 149-210-165-102 sshd[10946]: Failed password for invalid user guang from 186.210.115.15 port 57012 ssh2 Apr 25 02:00:51 149-210-165-102 sshd[10947]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:01:05 149-210-165-102 sshd[10969]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:01:05 149-210-165-102 sshd[10969]: Invalid user dep from 177.134.160.29 Apr 25 02:01:05 149-210-165-102 sshd[10970]: input_userauth_request: invalid user dep Apr 25 02:01:05 149-210-165-102 sshd[10969]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:01:05 149-210-165-102 sshd[10969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:01:07 149-210-165-102 sshd[10969]: Failed password for invalid user dep from 177.134.160.29 port 50729 ssh2 Apr 25 02:01:07 149-210-165-102 sshd[10970]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:01:10 149-210-165-102 sshd[10974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:01:11 149-210-165-102 sshd[10976]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:01:11 149-210-165-102 sshd[10976]: Invalid user nitin from 186.206.157.74 Apr 25 02:01:11 149-210-165-102 sshd[10977]: input_userauth_request: invalid user nitin Apr 25 02:01:11 149-210-165-102 sshd[10976]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:01:11 149-210-165-102 sshd[10976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:01:12 149-210-165-102 sshd[10974]: Failed password for root from 119.28.61.47 port 58320 ssh2 Apr 25 02:01:12 149-210-165-102 sshd[10975]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:01:13 149-210-165-102 sshd[10976]: Failed password for invalid user nitin from 186.206.157.74 port 34952 ssh2 Apr 25 02:01:16 149-210-165-102 sshd[10977]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:01:53 149-210-165-102 sshd[10993]: Invalid user tomi from 45.248.68.206 Apr 25 02:01:53 149-210-165-102 sshd[10994]: input_userauth_request: invalid user tomi Apr 25 02:01:53 149-210-165-102 sshd[10993]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:01:53 149-210-165-102 sshd[10993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:01:55 149-210-165-102 sshd[10993]: Failed password for invalid user tomi from 45.248.68.206 port 41576 ssh2 Apr 25 02:01:55 149-210-165-102 sshd[10994]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:02:24 149-210-165-102 sshd[11016]: Invalid user hines from 199.195.252.236 Apr 25 02:02:24 149-210-165-102 sshd[11017]: input_userauth_request: invalid user hines Apr 25 02:02:24 149-210-165-102 sshd[11016]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:02:24 149-210-165-102 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:02:26 149-210-165-102 sshd[11016]: Failed password for invalid user hines from 199.195.252.236 port 34098 ssh2 Apr 25 02:02:26 149-210-165-102 sshd[11017]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:02:32 149-210-165-102 sshd[11027]: Invalid user le from 47.254.179.224 Apr 25 02:02:32 149-210-165-102 sshd[11028]: input_userauth_request: invalid user le Apr 25 02:02:32 149-210-165-102 sshd[11027]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:02:32 149-210-165-102 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:02:34 149-210-165-102 sshd[11027]: Failed password for invalid user le from 47.254.179.224 port 54330 ssh2 Apr 25 02:02:34 149-210-165-102 sshd[11028]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:02:55 149-210-165-102 sshd[11040]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:02:55 149-210-165-102 sshd[11040]: Invalid user user from 186.210.115.15 Apr 25 02:02:55 149-210-165-102 sshd[11041]: input_userauth_request: invalid user user Apr 25 02:02:55 149-210-165-102 sshd[11040]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:02:55 149-210-165-102 sshd[11040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:02:57 149-210-165-102 sshd[11040]: Failed password for invalid user user from 186.210.115.15 port 59530 ssh2 Apr 25 02:02:57 149-210-165-102 sshd[11041]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:03:16 149-210-165-102 sshd[11057]: Connection closed by 186.206.157.74 Apr 25 02:03:34 149-210-165-102 sshd[11068]: Invalid user postgres from 121.5.166.237 Apr 25 02:03:34 149-210-165-102 sshd[11069]: input_userauth_request: invalid user postgres Apr 25 02:03:34 149-210-165-102 sshd[11068]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:03:34 149-210-165-102 sshd[11068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:03:36 149-210-165-102 sshd[11068]: Failed password for invalid user postgres from 121.5.166.237 port 36854 ssh2 Apr 25 02:03:37 149-210-165-102 sshd[11069]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:03:49 149-210-165-102 sshd[11071]: Invalid user postgres from 129.146.140.161 Apr 25 02:03:49 149-210-165-102 sshd[11072]: input_userauth_request: invalid user postgres Apr 25 02:03:49 149-210-165-102 sshd[11071]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:03:49 149-210-165-102 sshd[11071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:03:51 149-210-165-102 sshd[11071]: Failed password for invalid user postgres from 129.146.140.161 port 33846 ssh2 Apr 25 02:03:51 149-210-165-102 sshd[11072]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:04:08 149-210-165-102 sshd[11094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:04:08 149-210-165-102 sshd[11091]: Invalid user wu from 119.28.61.47 Apr 25 02:04:08 149-210-165-102 sshd[11092]: input_userauth_request: invalid user wu Apr 25 02:04:08 149-210-165-102 sshd[11091]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:04:08 149-210-165-102 sshd[11091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:04:10 149-210-165-102 sshd[11094]: Failed password for root from 199.195.252.236 port 38980 ssh2 Apr 25 02:04:10 149-210-165-102 sshd[11095]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:04:10 149-210-165-102 sshd[11091]: Failed password for invalid user wu from 119.28.61.47 port 55016 ssh2 Apr 25 02:04:11 149-210-165-102 sshd[11096]: Invalid user cdrom from 45.248.68.206 Apr 25 02:04:11 149-210-165-102 sshd[11097]: input_userauth_request: invalid user cdrom Apr 25 02:04:11 149-210-165-102 sshd[11096]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:04:11 149-210-165-102 sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:04:11 149-210-165-102 sshd[11092]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:04:13 149-210-165-102 sshd[11096]: Failed password for invalid user cdrom from 45.248.68.206 port 40134 ssh2 Apr 25 02:04:13 149-210-165-102 sshd[11097]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:04:40 149-210-165-102 sshd[11114]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:04:40 149-210-165-102 sshd[11114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 02:04:42 149-210-165-102 sshd[11114]: Failed password for root from 177.134.160.29 port 42006 ssh2 Apr 25 02:04:42 149-210-165-102 sshd[11115]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:04:51 149-210-165-102 sshd[11121]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:04:51 149-210-165-102 sshd[11121]: Invalid user cmb from 186.206.157.74 Apr 25 02:04:51 149-210-165-102 sshd[11122]: input_userauth_request: invalid user cmb Apr 25 02:04:51 149-210-165-102 sshd[11121]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:04:51 149-210-165-102 sshd[11121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:04:53 149-210-165-102 sshd[11121]: Failed password for invalid user cmb from 186.206.157.74 port 47084 ssh2 Apr 25 02:04:53 149-210-165-102 sshd[11122]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:05:00 149-210-165-102 sshd[11128]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:05:00 149-210-165-102 sshd[11128]: Invalid user omv from 186.210.115.15 Apr 25 02:05:00 149-210-165-102 sshd[11129]: input_userauth_request: invalid user omv Apr 25 02:05:00 149-210-165-102 sshd[11128]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:05:00 149-210-165-102 sshd[11128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:05:02 149-210-165-102 sshd[11128]: Failed password for invalid user omv from 186.210.115.15 port 33826 ssh2 Apr 25 02:05:02 149-210-165-102 sshd[11129]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:05:42 149-210-165-102 sshd[11148]: Invalid user admin from 47.254.179.224 Apr 25 02:05:42 149-210-165-102 sshd[11149]: input_userauth_request: invalid user admin Apr 25 02:05:42 149-210-165-102 sshd[11148]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:05:42 149-210-165-102 sshd[11148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:05:44 149-210-165-102 sshd[11148]: Failed password for invalid user admin from 47.254.179.224 port 37006 ssh2 Apr 25 02:05:44 149-210-165-102 sshd[11149]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:05:53 149-210-165-102 sshd[11154]: Invalid user cssserver from 199.195.252.236 Apr 25 02:05:53 149-210-165-102 sshd[11155]: input_userauth_request: invalid user cssserver Apr 25 02:05:53 149-210-165-102 sshd[11154]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:05:53 149-210-165-102 sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:05:55 149-210-165-102 sshd[11154]: Failed password for invalid user cssserver from 199.195.252.236 port 43866 ssh2 Apr 25 02:05:55 149-210-165-102 sshd[11155]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:06:16 149-210-165-102 sshd[11162]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:06:16 149-210-165-102 sshd[11162]: Invalid user webmaster from 186.206.157.74 Apr 25 02:06:16 149-210-165-102 sshd[11163]: input_userauth_request: invalid user webmaster Apr 25 02:06:16 149-210-165-102 sshd[11162]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:06:16 149-210-165-102 sshd[11162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:06:19 149-210-165-102 sshd[11162]: Failed password for invalid user webmaster from 186.206.157.74 port 24559 ssh2 Apr 25 02:06:19 149-210-165-102 sshd[11163]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:07:02 149-210-165-102 sshd[11193]: Invalid user eng from 121.5.166.237 Apr 25 02:07:02 149-210-165-102 sshd[11194]: input_userauth_request: invalid user eng Apr 25 02:07:02 149-210-165-102 sshd[11193]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:07:02 149-210-165-102 sshd[11193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:07:04 149-210-165-102 sshd[11193]: Failed password for invalid user eng from 121.5.166.237 port 44978 ssh2 Apr 25 02:07:04 149-210-165-102 sshd[11194]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:07:09 149-210-165-102 sshd[11196]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:07:09 149-210-165-102 sshd[11196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:07:11 149-210-165-102 sshd[11196]: Failed password for root from 186.210.115.15 port 36348 ssh2 Apr 25 02:07:11 149-210-165-102 sshd[11197]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:07:12 149-210-165-102 sshd[11198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:07:13 149-210-165-102 sshd[11198]: Failed password for root from 45.248.68.206 port 38638 ssh2 Apr 25 02:07:13 149-210-165-102 sshd[11199]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:07:19 149-210-165-102 sshd[11201]: Invalid user user from 119.28.61.47 Apr 25 02:07:19 149-210-165-102 sshd[11202]: input_userauth_request: invalid user user Apr 25 02:07:19 149-210-165-102 sshd[11201]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:07:19 149-210-165-102 sshd[11201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:07:21 149-210-165-102 sshd[11201]: Failed password for invalid user user from 119.28.61.47 port 51694 ssh2 Apr 25 02:07:21 149-210-165-102 sshd[11202]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:07:34 149-210-165-102 sshd[11214]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:07:34 149-210-165-102 sshd[11214]: Invalid user kp from 122.252.231.138 Apr 25 02:07:34 149-210-165-102 sshd[11215]: input_userauth_request: invalid user kp Apr 25 02:07:34 149-210-165-102 sshd[11214]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:07:34 149-210-165-102 sshd[11214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:07:36 149-210-165-102 sshd[11214]: Failed password for invalid user kp from 122.252.231.138 port 39852 ssh2 Apr 25 02:07:36 149-210-165-102 sshd[11215]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:07:43 149-210-165-102 sshd[11225]: Invalid user bananapi from 199.195.252.236 Apr 25 02:07:43 149-210-165-102 sshd[11227]: input_userauth_request: invalid user bananapi Apr 25 02:07:43 149-210-165-102 sshd[11225]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:07:43 149-210-165-102 sshd[11225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:07:45 149-210-165-102 sshd[11225]: Failed password for invalid user bananapi from 199.195.252.236 port 48748 ssh2 Apr 25 02:07:45 149-210-165-102 sshd[11227]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:07:47 149-210-165-102 sshd[11232]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:07:47 149-210-165-102 sshd[11232]: Invalid user sayuri from 186.206.157.74 Apr 25 02:07:47 149-210-165-102 sshd[11233]: input_userauth_request: invalid user sayuri Apr 25 02:07:47 149-210-165-102 sshd[11232]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:07:47 149-210-165-102 sshd[11232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:07:49 149-210-165-102 sshd[11232]: Failed password for invalid user sayuri from 186.206.157.74 port 14741 ssh2 Apr 25 02:07:49 149-210-165-102 sshd[11233]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:08:00 149-210-165-102 sshd[11247]: Invalid user polkitd from 150.109.252.206 Apr 25 02:08:00 149-210-165-102 sshd[11248]: input_userauth_request: invalid user polkitd Apr 25 02:08:00 149-210-165-102 sshd[11247]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:08:00 149-210-165-102 sshd[11247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:08:02 149-210-165-102 sshd[11247]: Failed password for invalid user polkitd from 150.109.252.206 port 56052 ssh2 Apr 25 02:08:02 149-210-165-102 sshd[11248]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:08:03 149-210-165-102 sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 user=root Apr 25 02:08:04 149-210-165-102 sshd[11249]: Failed password for root from 178.128.210.45 port 40112 ssh2 Apr 25 02:08:05 149-210-165-102 sshd[11250]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:08:42 149-210-165-102 sshd[11281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=root Apr 25 02:08:44 149-210-165-102 sshd[11281]: Failed password for root from 47.254.179.224 port 47896 ssh2 Apr 25 02:08:44 149-210-165-102 sshd[11282]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:09:07 149-210-165-102 sshd[11305]: Invalid user polkitd from 47.254.236.183 Apr 25 02:09:07 149-210-165-102 sshd[11306]: input_userauth_request: invalid user polkitd Apr 25 02:09:07 149-210-165-102 sshd[11305]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:09:07 149-210-165-102 sshd[11305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.236.183 Apr 25 02:09:09 149-210-165-102 sshd[11305]: Failed password for invalid user polkitd from 47.254.236.183 port 54700 ssh2 Apr 25 02:09:09 149-210-165-102 sshd[11306]: Received disconnect from 47.254.236.183: 11: Bye Bye Apr 25 02:09:26 149-210-165-102 sshd[11317]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:09:26 149-210-165-102 sshd[11317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:09:27 149-210-165-102 sshd[11320]: Invalid user ja from 45.248.68.206 Apr 25 02:09:27 149-210-165-102 sshd[11322]: input_userauth_request: invalid user ja Apr 25 02:09:27 149-210-165-102 sshd[11320]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:09:27 149-210-165-102 sshd[11320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:09:28 149-210-165-102 sshd[11317]: Failed password for root from 186.206.157.74 port 34880 ssh2 Apr 25 02:09:28 149-210-165-102 sshd[11318]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:09:28 149-210-165-102 sshd[11324]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:09:28 149-210-165-102 sshd[11324]: Invalid user jack from 186.210.115.15 Apr 25 02:09:28 149-210-165-102 sshd[11325]: input_userauth_request: invalid user jack Apr 25 02:09:28 149-210-165-102 sshd[11324]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:09:28 149-210-165-102 sshd[11324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:09:29 149-210-165-102 sshd[11320]: Failed password for invalid user ja from 45.248.68.206 port 37070 ssh2 Apr 25 02:09:29 149-210-165-102 sshd[11322]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:09:30 149-210-165-102 sshd[11324]: Failed password for invalid user jack from 186.210.115.15 port 38858 ssh2 Apr 25 02:09:30 149-210-165-102 sshd[11325]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:09:30 149-210-165-102 sshd[11327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:09:33 149-210-165-102 sshd[11327]: Failed password for root from 199.195.252.236 port 53630 ssh2 Apr 25 02:09:33 149-210-165-102 sshd[11328]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:09:41 149-210-165-102 sshd[11331]: Invalid user martyn from 124.156.239.240 Apr 25 02:09:41 149-210-165-102 sshd[11332]: input_userauth_request: invalid user martyn Apr 25 02:09:41 149-210-165-102 sshd[11331]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:09:41 149-210-165-102 sshd[11331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:09:43 149-210-165-102 sshd[11331]: Failed password for invalid user martyn from 124.156.239.240 port 56020 ssh2 Apr 25 02:09:43 149-210-165-102 sshd[11332]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:10:01 149-210-165-102 sshd[11336]: Invalid user tsbot from 129.146.140.161 Apr 25 02:10:01 149-210-165-102 sshd[11337]: input_userauth_request: invalid user tsbot Apr 25 02:10:01 149-210-165-102 sshd[11336]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:10:01 149-210-165-102 sshd[11336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:10:03 149-210-165-102 sshd[11336]: Failed password for invalid user tsbot from 129.146.140.161 port 45254 ssh2 Apr 25 02:10:03 149-210-165-102 sshd[11337]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:10:26 149-210-165-102 sshd[11388]: Invalid user invite from 121.5.166.237 Apr 25 02:10:26 149-210-165-102 sshd[11390]: input_userauth_request: invalid user invite Apr 25 02:10:26 149-210-165-102 sshd[11388]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:10:26 149-210-165-102 sshd[11388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:10:28 149-210-165-102 sshd[11388]: Failed password for invalid user invite from 121.5.166.237 port 53124 ssh2 Apr 25 02:10:29 149-210-165-102 sshd[11390]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:10:38 149-210-165-102 sshd[11397]: Invalid user alex from 119.28.61.47 Apr 25 02:10:38 149-210-165-102 sshd[11398]: input_userauth_request: invalid user alex Apr 25 02:10:38 149-210-165-102 sshd[11397]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:10:38 149-210-165-102 sshd[11397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:10:40 149-210-165-102 sshd[11397]: Failed password for invalid user alex from 119.28.61.47 port 48392 ssh2 Apr 25 02:10:40 149-210-165-102 sshd[11398]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:11:02 149-210-165-102 sshd[11422]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:11:02 149-210-165-102 sshd[11422]: Invalid user wac from 186.206.157.74 Apr 25 02:11:02 149-210-165-102 sshd[11423]: input_userauth_request: invalid user wac Apr 25 02:11:02 149-210-165-102 sshd[11422]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:11:02 149-210-165-102 sshd[11422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:11:04 149-210-165-102 sshd[11422]: Failed password for invalid user wac from 186.206.157.74 port 59107 ssh2 Apr 25 02:11:05 149-210-165-102 sshd[11425]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:11:05 149-210-165-102 sshd[11425]: Invalid user cassandra from 122.252.231.138 Apr 25 02:11:05 149-210-165-102 sshd[11426]: input_userauth_request: invalid user cassandra Apr 25 02:11:05 149-210-165-102 sshd[11425]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:11:05 149-210-165-102 sshd[11425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:11:06 149-210-165-102 sshd[11423]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:11:06 149-210-165-102 sshd[11425]: Failed password for invalid user cassandra from 122.252.231.138 port 38626 ssh2 Apr 25 02:11:07 149-210-165-102 sshd[11426]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:11:35 149-210-165-102 sshd[11448]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:11:35 149-210-165-102 sshd[11448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:11:37 149-210-165-102 sshd[11448]: Failed password for root from 186.210.115.15 port 41364 ssh2 Apr 25 02:11:37 149-210-165-102 sshd[11449]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:11:39 149-210-165-102 sshd[11452]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:11:39 149-210-165-102 sshd[11452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 02:11:41 149-210-165-102 sshd[11452]: Failed password for root from 177.134.160.29 port 52782 ssh2 Apr 25 02:11:41 149-210-165-102 sshd[11453]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:11:42 149-210-165-102 sshd[11455]: Invalid user balaji from 47.254.179.224 Apr 25 02:11:42 149-210-165-102 sshd[11456]: input_userauth_request: invalid user balaji Apr 25 02:11:42 149-210-165-102 sshd[11455]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:11:42 149-210-165-102 sshd[11455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:11:43 149-210-165-102 sshd[11458]: Invalid user ipi from 45.248.68.206 Apr 25 02:11:43 149-210-165-102 sshd[11459]: input_userauth_request: invalid user ipi Apr 25 02:11:43 149-210-165-102 sshd[11458]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:11:43 149-210-165-102 sshd[11458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:11:44 149-210-165-102 sshd[11455]: Failed password for invalid user balaji from 47.254.179.224 port 58786 ssh2 Apr 25 02:11:44 149-210-165-102 sshd[11456]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:11:45 149-210-165-102 sshd[11458]: Failed password for invalid user ipi from 45.248.68.206 port 35500 ssh2 Apr 25 02:11:45 149-210-165-102 sshd[11459]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:12:15 149-210-165-102 sshd[11475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 user=root Apr 25 02:12:17 149-210-165-102 sshd[11475]: Failed password for root from 121.5.23.61 port 53782 ssh2 Apr 25 02:12:17 149-210-165-102 sshd[11476]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:12:43 149-210-165-102 sshd[11499]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:12:43 149-210-165-102 sshd[11499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:12:45 149-210-165-102 sshd[11499]: Failed password for root from 186.206.157.74 port 1075 ssh2 Apr 25 02:12:46 149-210-165-102 sshd[11500]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:12:54 149-210-165-102 sshd[11505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 user=root Apr 25 02:12:57 149-210-165-102 sshd[11505]: Failed password for root from 140.143.230.41 port 46362 ssh2 Apr 25 02:12:57 149-210-165-102 sshd[11506]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:13:10 149-210-165-102 sshd[11513]: fatal: Read from socket failed: Connection reset by peer Apr 25 02:13:16 149-210-165-102 sshd[11517]: fatal: Read from socket failed: Connection reset by peer Apr 25 02:13:39 149-210-165-102 sshd[11532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:13:41 149-210-165-102 sshd[11532]: Failed password for root from 119.28.61.47 port 45066 ssh2 Apr 25 02:13:41 149-210-165-102 sshd[11533]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:13:44 149-210-165-102 sshd[11537]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:13:44 149-210-165-102 sshd[11537]: Invalid user test1 from 186.210.115.15 Apr 25 02:13:44 149-210-165-102 sshd[11538]: input_userauth_request: invalid user test1 Apr 25 02:13:44 149-210-165-102 sshd[11537]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:13:44 149-210-165-102 sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:13:46 149-210-165-102 sshd[11537]: Failed password for invalid user test1 from 186.210.115.15 port 43874 ssh2 Apr 25 02:13:47 149-210-165-102 sshd[11538]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:13:52 149-210-165-102 sshd[11545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1-34-105-35.hinet-ip.hinet.net user=root Apr 25 02:13:54 149-210-165-102 sshd[11545]: Failed password for root from 1.34.105.35 port 36664 ssh2 Apr 25 02:13:54 149-210-165-102 sshd[11546]: Received disconnect from 1.34.105.35: 11: Bye Bye Apr 25 02:13:57 149-210-165-102 sshd[11550]: Invalid user pz from 199.195.252.236 Apr 25 02:13:57 149-210-165-102 sshd[11551]: input_userauth_request: invalid user pz Apr 25 02:13:57 149-210-165-102 sshd[11550]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:13:57 149-210-165-102 sshd[11550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:13:59 149-210-165-102 sshd[11550]: Failed password for invalid user pz from 199.195.252.236 port 58520 ssh2 Apr 25 02:13:59 149-210-165-102 sshd[11551]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:14:07 149-210-165-102 sshd[11557]: Connection closed by 45.248.68.206 Apr 25 02:14:16 149-210-165-102 sshd[11564]: reverse mapping checking getaddrinfo for static-201-62-54-96.v4.naclick.com.br [201.62.54.96] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:14:16 149-210-165-102 sshd[11564]: Invalid user laura from 201.62.54.96 Apr 25 02:14:16 149-210-165-102 sshd[11566]: input_userauth_request: invalid user laura Apr 25 02:14:16 149-210-165-102 sshd[11564]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:14:16 149-210-165-102 sshd[11564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.62.54.96 Apr 25 02:14:17 149-210-165-102 sshd[11567]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:14:17 149-210-165-102 sshd[11567]: Invalid user thomas from 186.206.157.74 Apr 25 02:14:17 149-210-165-102 sshd[11568]: input_userauth_request: invalid user thomas Apr 25 02:14:17 149-210-165-102 sshd[11567]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:14:17 149-210-165-102 sshd[11567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:14:18 149-210-165-102 sshd[11564]: Failed password for invalid user laura from 201.62.54.96 port 42056 ssh2 Apr 25 02:14:18 149-210-165-102 sshd[11566]: Received disconnect from 201.62.54.96: 11: Bye Bye Apr 25 02:14:19 149-210-165-102 sshd[11567]: Failed password for invalid user thomas from 186.206.157.74 port 37344 ssh2 Apr 25 02:14:19 149-210-165-102 sshd[11568]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:14:35 149-210-165-102 sshd[11577]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:14:35 149-210-165-102 sshd[11577]: Invalid user student from 122.252.231.138 Apr 25 02:14:35 149-210-165-102 sshd[11578]: input_userauth_request: invalid user student Apr 25 02:14:35 149-210-165-102 sshd[11577]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:14:35 149-210-165-102 sshd[11577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:14:36 149-210-165-102 sshd[11580]: Invalid user codeunbug from 81.68.109.37 Apr 25 02:14:36 149-210-165-102 sshd[11581]: input_userauth_request: invalid user codeunbug Apr 25 02:14:36 149-210-165-102 sshd[11580]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:14:36 149-210-165-102 sshd[11580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:14:37 149-210-165-102 sshd[11577]: Failed password for invalid user student from 122.252.231.138 port 37440 ssh2 Apr 25 02:14:37 149-210-165-102 sshd[11578]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:14:37 149-210-165-102 sshd[11580]: Failed password for invalid user codeunbug from 81.68.109.37 port 55420 ssh2 Apr 25 02:14:38 149-210-165-102 sshd[11581]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:14:38 149-210-165-102 sshd[11549]: Connection closed by 121.5.166.237 Apr 25 02:14:41 149-210-165-102 sshd[11584]: Invalid user dbuser from 47.254.179.224 Apr 25 02:14:41 149-210-165-102 sshd[11585]: input_userauth_request: invalid user dbuser Apr 25 02:14:41 149-210-165-102 sshd[11584]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:14:41 149-210-165-102 sshd[11584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:14:43 149-210-165-102 sshd[11584]: Failed password for invalid user dbuser from 47.254.179.224 port 41454 ssh2 Apr 25 02:14:43 149-210-165-102 sshd[11585]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:15:16 149-210-165-102 sshd[11625]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:15:16 149-210-165-102 sshd[11625]: Invalid user shamim from 177.134.160.29 Apr 25 02:15:16 149-210-165-102 sshd[11626]: input_userauth_request: invalid user shamim Apr 25 02:15:16 149-210-165-102 sshd[11625]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:15:16 149-210-165-102 sshd[11625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:15:18 149-210-165-102 sshd[11625]: Failed password for invalid user shamim from 177.134.160.29 port 44070 ssh2 Apr 25 02:15:18 149-210-165-102 sshd[11626]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:15:41 149-210-165-102 sshd[11638]: Invalid user server from 199.195.252.236 Apr 25 02:15:41 149-210-165-102 sshd[11639]: input_userauth_request: invalid user server Apr 25 02:15:41 149-210-165-102 sshd[11638]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:15:41 149-210-165-102 sshd[11638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:15:43 149-210-165-102 sshd[11638]: Failed password for invalid user server from 199.195.252.236 port 35170 ssh2 Apr 25 02:15:43 149-210-165-102 sshd[11639]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:15:49 149-210-165-102 sshd[11643]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:15:49 149-210-165-102 sshd[11643]: Invalid user steam from 186.210.115.15 Apr 25 02:15:49 149-210-165-102 sshd[11644]: input_userauth_request: invalid user steam Apr 25 02:15:49 149-210-165-102 sshd[11643]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:15:49 149-210-165-102 sshd[11643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:15:51 149-210-165-102 sshd[11643]: Failed password for invalid user steam from 186.210.115.15 port 46384 ssh2 Apr 25 02:15:51 149-210-165-102 sshd[11644]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:16:02 149-210-165-102 sshd[11641]: Invalid user mc from 129.146.140.161 Apr 25 02:16:02 149-210-165-102 sshd[11642]: input_userauth_request: invalid user mc Apr 25 02:16:02 149-210-165-102 sshd[11641]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:16:02 149-210-165-102 sshd[11641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:16:04 149-210-165-102 sshd[11641]: Failed password for invalid user mc from 129.146.140.161 port 56710 ssh2 Apr 25 02:16:04 149-210-165-102 sshd[11642]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:16:15 149-210-165-102 sshd[11648]: Connection closed by 186.206.157.74 Apr 25 02:16:37 149-210-165-102 sshd[11671]: Invalid user user from 45.248.68.206 Apr 25 02:16:37 149-210-165-102 sshd[11672]: input_userauth_request: invalid user user Apr 25 02:16:37 149-210-165-102 sshd[11671]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:16:37 149-210-165-102 sshd[11671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:16:39 149-210-165-102 sshd[11671]: Failed password for invalid user user from 45.248.68.206 port 60598 ssh2 Apr 25 02:16:39 149-210-165-102 sshd[11672]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:16:53 149-210-165-102 sshd[11679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:16:55 149-210-165-102 sshd[11679]: Failed password for root from 119.28.61.47 port 41798 ssh2 Apr 25 02:16:55 149-210-165-102 sshd[11680]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:17:22 149-210-165-102 sshd[11704]: Invalid user suporte from 121.5.166.237 Apr 25 02:17:22 149-210-165-102 sshd[11705]: input_userauth_request: invalid user suporte Apr 25 02:17:22 149-210-165-102 sshd[11704]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:17:22 149-210-165-102 sshd[11704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:17:22 149-210-165-102 sshd[11706]: Invalid user postgres from 180.76.134.229 Apr 25 02:17:22 149-210-165-102 sshd[11708]: input_userauth_request: invalid user postgres Apr 25 02:17:22 149-210-165-102 sshd[11706]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:17:22 149-210-165-102 sshd[11706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:17:24 149-210-165-102 sshd[11704]: Failed password for invalid user suporte from 121.5.166.237 port 41088 ssh2 Apr 25 02:17:24 149-210-165-102 sshd[11705]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:17:24 149-210-165-102 sshd[11706]: Failed password for invalid user postgres from 180.76.134.229 port 36000 ssh2 Apr 25 02:17:24 149-210-165-102 sshd[11708]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:17:25 149-210-165-102 sshd[11709]: Invalid user verdaccio from 199.195.252.236 Apr 25 02:17:25 149-210-165-102 sshd[11710]: input_userauth_request: invalid user verdaccio Apr 25 02:17:25 149-210-165-102 sshd[11709]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:17:25 149-210-165-102 sshd[11709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:17:27 149-210-165-102 sshd[11713]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:17:27 149-210-165-102 sshd[11713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:17:27 149-210-165-102 sshd[11709]: Failed password for invalid user verdaccio from 199.195.252.236 port 40048 ssh2 Apr 25 02:17:27 149-210-165-102 sshd[11710]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:17:29 149-210-165-102 sshd[11713]: Failed password for root from 186.206.157.74 port 46123 ssh2 Apr 25 02:17:29 149-210-165-102 sshd[11714]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:17:42 149-210-165-102 sshd[11718]: Invalid user bojan from 47.254.179.224 Apr 25 02:17:42 149-210-165-102 sshd[11719]: input_userauth_request: invalid user bojan Apr 25 02:17:42 149-210-165-102 sshd[11718]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:17:42 149-210-165-102 sshd[11718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:17:44 149-210-165-102 sshd[11718]: Failed password for invalid user bojan from 47.254.179.224 port 52352 ssh2 Apr 25 02:17:44 149-210-165-102 sshd[11719]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:17:55 149-210-165-102 sshd[11727]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:17:55 149-210-165-102 sshd[11727]: Invalid user noa from 186.210.115.15 Apr 25 02:17:55 149-210-165-102 sshd[11728]: input_userauth_request: invalid user noa Apr 25 02:17:55 149-210-165-102 sshd[11727]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:17:55 149-210-165-102 sshd[11727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:17:57 149-210-165-102 sshd[11727]: Failed password for invalid user noa from 186.210.115.15 port 48896 ssh2 Apr 25 02:17:57 149-210-165-102 sshd[11728]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:18:46 149-210-165-102 sshd[11748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:18:48 149-210-165-102 sshd[11748]: Failed password for root from 45.248.68.206 port 59030 ssh2 Apr 25 02:18:49 149-210-165-102 sshd[11750]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:18:53 149-210-165-102 sshd[11756]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:18:53 149-210-165-102 sshd[11756]: Invalid user guest from 177.134.160.29 Apr 25 02:18:53 149-210-165-102 sshd[11757]: input_userauth_request: invalid user guest Apr 25 02:18:53 149-210-165-102 sshd[11756]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:18:53 149-210-165-102 sshd[11756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:18:55 149-210-165-102 sshd[11756]: Failed password for invalid user guest from 177.134.160.29 port 35333 ssh2 Apr 25 02:18:55 149-210-165-102 sshd[11757]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:18:58 149-210-165-102 sshd[11759]: Invalid user test from 121.4.71.96 Apr 25 02:18:58 149-210-165-102 sshd[11761]: input_userauth_request: invalid user test Apr 25 02:18:58 149-210-165-102 sshd[11759]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:18:58 149-210-165-102 sshd[11759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:18:59 149-210-165-102 sshd[11762]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:18:59 149-210-165-102 sshd[11762]: Invalid user admin from 186.206.157.74 Apr 25 02:18:59 149-210-165-102 sshd[11763]: input_userauth_request: invalid user admin Apr 25 02:18:59 149-210-165-102 sshd[11762]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:18:59 149-210-165-102 sshd[11762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:19:01 149-210-165-102 sshd[11759]: Failed password for invalid user test from 121.4.71.96 port 60780 ssh2 Apr 25 02:19:01 149-210-165-102 sshd[11761]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:19:02 149-210-165-102 sshd[11762]: Failed password for invalid user admin from 186.206.157.74 port 17971 ssh2 Apr 25 02:19:02 149-210-165-102 sshd[11763]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:19:12 149-210-165-102 sshd[11770]: Invalid user www-data from 199.195.252.236 Apr 25 02:19:12 149-210-165-102 sshd[11771]: input_userauth_request: invalid user www-data Apr 25 02:19:12 149-210-165-102 sshd[11770]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:19:12 149-210-165-102 sshd[11770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:19:14 149-210-165-102 sshd[11770]: Failed password for invalid user www-data from 199.195.252.236 port 44932 ssh2 Apr 25 02:19:14 149-210-165-102 sshd[11771]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:19:21 149-210-165-102 sshd[11779]: Invalid user testwww from 42.193.54.22 Apr 25 02:19:21 149-210-165-102 sshd[11780]: input_userauth_request: invalid user testwww Apr 25 02:19:21 149-210-165-102 sshd[11779]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:19:21 149-210-165-102 sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:19:23 149-210-165-102 sshd[11779]: Failed password for invalid user testwww from 42.193.54.22 port 53770 ssh2 Apr 25 02:19:23 149-210-165-102 sshd[11780]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:20:05 149-210-165-102 sshd[11818]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:20:05 149-210-165-102 sshd[11818]: Invalid user ph from 186.210.115.15 Apr 25 02:20:05 149-210-165-102 sshd[11820]: input_userauth_request: invalid user ph Apr 25 02:20:05 149-210-165-102 sshd[11818]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:05 149-210-165-102 sshd[11818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:20:07 149-210-165-102 sshd[11818]: Failed password for invalid user ph from 186.210.115.15 port 51408 ssh2 Apr 25 02:20:07 149-210-165-102 sshd[11820]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:20:12 149-210-165-102 sshd[11791]: Invalid user allan from 119.28.61.47 Apr 25 02:20:12 149-210-165-102 sshd[11792]: input_userauth_request: invalid user allan Apr 25 02:20:12 149-210-165-102 sshd[11791]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:12 149-210-165-102 sshd[11791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:20:14 149-210-165-102 sshd[11791]: Failed password for invalid user allan from 119.28.61.47 port 38490 ssh2 Apr 25 02:20:14 149-210-165-102 sshd[11792]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:20:40 149-210-165-102 sshd[11837]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:20:40 149-210-165-102 sshd[11837]: Invalid user yuri from 186.206.157.74 Apr 25 02:20:40 149-210-165-102 sshd[11838]: input_userauth_request: invalid user yuri Apr 25 02:20:40 149-210-165-102 sshd[11837]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:40 149-210-165-102 sshd[11837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:20:42 149-210-165-102 sshd[11837]: Failed password for invalid user yuri from 186.206.157.74 port 7931 ssh2 Apr 25 02:20:42 149-210-165-102 sshd[11838]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:20:45 149-210-165-102 sshd[11844]: Invalid user florian from 42.192.118.249 Apr 25 02:20:45 149-210-165-102 sshd[11845]: input_userauth_request: invalid user florian Apr 25 02:20:45 149-210-165-102 sshd[11844]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:45 149-210-165-102 sshd[11844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:20:47 149-210-165-102 sshd[11844]: Failed password for invalid user florian from 42.192.118.249 port 49588 ssh2 Apr 25 02:20:47 149-210-165-102 sshd[11845]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:20:47 149-210-165-102 sshd[11851]: Invalid user rus from 47.254.179.224 Apr 25 02:20:47 149-210-165-102 sshd[11852]: input_userauth_request: invalid user rus Apr 25 02:20:47 149-210-165-102 sshd[11851]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:47 149-210-165-102 sshd[11851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:20:49 149-210-165-102 sshd[11851]: Failed password for invalid user rus from 47.254.179.224 port 35028 ssh2 Apr 25 02:20:49 149-210-165-102 sshd[11852]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:20:50 149-210-165-102 sshd[11853]: Invalid user ikm from 121.5.166.237 Apr 25 02:20:50 149-210-165-102 sshd[11854]: input_userauth_request: invalid user ikm Apr 25 02:20:50 149-210-165-102 sshd[11853]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:20:50 149-210-165-102 sshd[11853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:20:52 149-210-165-102 sshd[11853]: Failed password for invalid user ikm from 121.5.166.237 port 49196 ssh2 Apr 25 02:20:53 149-210-165-102 sshd[11854]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:21:00 149-210-165-102 sshd[11858]: Invalid user xue from 199.195.252.236 Apr 25 02:21:00 149-210-165-102 sshd[11859]: input_userauth_request: invalid user xue Apr 25 02:21:00 149-210-165-102 sshd[11858]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:21:00 149-210-165-102 sshd[11858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:21:01 149-210-165-102 sshd[11858]: Failed password for invalid user xue from 199.195.252.236 port 49814 ssh2 Apr 25 02:21:01 149-210-165-102 sshd[11859]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:21:02 149-210-165-102 sshd[11861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:21:03 149-210-165-102 sshd[11861]: Failed password for root from 45.248.68.206 port 57464 ssh2 Apr 25 02:21:04 149-210-165-102 sshd[11862]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:21:37 149-210-165-102 sshd[11873]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:21:37 149-210-165-102 sshd[11873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 user=root Apr 25 02:21:39 149-210-165-102 sshd[11873]: Failed password for root from 122.252.231.138 port 35076 ssh2 Apr 25 02:21:39 149-210-165-102 sshd[11874]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:21:58 149-210-165-102 sshd[11878]: Invalid user user03 from 129.146.140.161 Apr 25 02:21:58 149-210-165-102 sshd[11879]: input_userauth_request: invalid user user03 Apr 25 02:21:58 149-210-165-102 sshd[11878]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:21:58 149-210-165-102 sshd[11878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:22:01 149-210-165-102 sshd[11878]: Failed password for invalid user user03 from 129.146.140.161 port 39904 ssh2 Apr 25 02:22:01 149-210-165-102 sshd[11879]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:22:13 149-210-165-102 sshd[11902]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:22:13 149-210-165-102 sshd[11902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:22:15 149-210-165-102 sshd[11902]: Failed password for root from 186.210.115.15 port 53914 ssh2 Apr 25 02:22:15 149-210-165-102 sshd[11903]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:22:17 149-210-165-102 sshd[11904]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:22:17 149-210-165-102 sshd[11904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 02:22:19 149-210-165-102 sshd[11904]: Failed password for root from 177.134.160.29 port 54835 ssh2 Apr 25 02:22:20 149-210-165-102 sshd[11905]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:22:22 149-210-165-102 sshd[11907]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:22:22 149-210-165-102 sshd[11907]: Invalid user ivete from 186.206.157.74 Apr 25 02:22:22 149-210-165-102 sshd[11910]: input_userauth_request: invalid user ivete Apr 25 02:22:22 149-210-165-102 sshd[11907]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:22:22 149-210-165-102 sshd[11907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:22:25 149-210-165-102 sshd[11907]: Failed password for invalid user ivete from 186.206.157.74 port 49894 ssh2 Apr 25 02:22:25 149-210-165-102 sshd[11910]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:22:45 149-210-165-102 sshd[11919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=ftpuser Apr 25 02:22:47 149-210-165-102 sshd[11921]: Invalid user trash from 42.193.54.22 Apr 25 02:22:47 149-210-165-102 sshd[11922]: input_userauth_request: invalid user trash Apr 25 02:22:47 149-210-165-102 sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:22:47 149-210-165-102 sshd[11921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:22:47 149-210-165-102 sshd[11919]: Failed password for ftpuser from 199.195.252.236 port 54696 ssh2 Apr 25 02:22:47 149-210-165-102 sshd[11920]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:22:49 149-210-165-102 sshd[11921]: Failed password for invalid user trash from 42.193.54.22 port 36594 ssh2 Apr 25 02:22:50 149-210-165-102 sshd[11922]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:22:51 149-210-165-102 sshd[11924]: Invalid user test from 178.128.210.45 Apr 25 02:22:51 149-210-165-102 sshd[11925]: input_userauth_request: invalid user test Apr 25 02:22:51 149-210-165-102 sshd[11924]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:22:51 149-210-165-102 sshd[11924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:22:53 149-210-165-102 sshd[11924]: Failed password for invalid user test from 178.128.210.45 port 58660 ssh2 Apr 25 02:22:53 149-210-165-102 sshd[11925]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:23:03 149-210-165-102 sshd[11929]: Invalid user trash from 150.109.252.206 Apr 25 02:23:03 149-210-165-102 sshd[11931]: input_userauth_request: invalid user trash Apr 25 02:23:03 149-210-165-102 sshd[11929]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:23:03 149-210-165-102 sshd[11929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:23:04 149-210-165-102 sshd[11937]: Invalid user ncs from 154.8.233.56 Apr 25 02:23:04 149-210-165-102 sshd[11938]: input_userauth_request: invalid user ncs Apr 25 02:23:04 149-210-165-102 sshd[11937]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:23:04 149-210-165-102 sshd[11937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:23:04 149-210-165-102 sshd[11929]: Failed password for invalid user trash from 150.109.252.206 port 45322 ssh2 Apr 25 02:23:05 149-210-165-102 sshd[11931]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:23:06 149-210-165-102 sshd[11937]: Failed password for invalid user ncs from 154.8.233.56 port 34952 ssh2 Apr 25 02:23:07 149-210-165-102 sshd[11938]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:23:13 149-210-165-102 sshd[11932]: Connection closed by 121.4.71.96 Apr 25 02:23:20 149-210-165-102 sshd[11957]: Did not receive identification string from 45.248.68.206 Apr 25 02:23:24 149-210-165-102 sshd[11940]: Invalid user manoel from 119.28.61.47 Apr 25 02:23:24 149-210-165-102 sshd[11941]: input_userauth_request: invalid user manoel Apr 25 02:23:24 149-210-165-102 sshd[11940]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:23:24 149-210-165-102 sshd[11940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:23:26 149-210-165-102 sshd[11940]: Failed password for invalid user manoel from 119.28.61.47 port 35216 ssh2 Apr 25 02:23:26 149-210-165-102 sshd[11941]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:23:53 149-210-165-102 sshd[11965]: Invalid user ubuntu from 47.254.179.224 Apr 25 02:23:53 149-210-165-102 sshd[11967]: input_userauth_request: invalid user ubuntu Apr 25 02:23:53 149-210-165-102 sshd[11965]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:23:53 149-210-165-102 sshd[11965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:23:55 149-210-165-102 sshd[11965]: Failed password for invalid user ubuntu from 47.254.179.224 port 45926 ssh2 Apr 25 02:23:55 149-210-165-102 sshd[11967]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:23:59 149-210-165-102 sshd[11968]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:23:59 149-210-165-102 sshd[11968]: Invalid user divya from 186.206.157.74 Apr 25 02:23:59 149-210-165-102 sshd[11969]: input_userauth_request: invalid user divya Apr 25 02:23:59 149-210-165-102 sshd[11968]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:23:59 149-210-165-102 sshd[11968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:24:01 149-210-165-102 sshd[11968]: Failed password for invalid user divya from 186.206.157.74 port 24975 ssh2 Apr 25 02:24:02 149-210-165-102 sshd[11969]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:24:16 149-210-165-102 sshd[11975]: Invalid user user2 from 121.5.166.237 Apr 25 02:24:16 149-210-165-102 sshd[11976]: input_userauth_request: invalid user user2 Apr 25 02:24:16 149-210-165-102 sshd[11975]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:24:16 149-210-165-102 sshd[11975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:24:19 149-210-165-102 sshd[11975]: Failed password for invalid user user2 from 121.5.166.237 port 57298 ssh2 Apr 25 02:24:19 149-210-165-102 sshd[11978]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:24:19 149-210-165-102 sshd[11978]: Invalid user umulus from 186.210.115.15 Apr 25 02:24:19 149-210-165-102 sshd[11979]: input_userauth_request: invalid user umulus Apr 25 02:24:19 149-210-165-102 sshd[11978]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:24:19 149-210-165-102 sshd[11978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:24:20 149-210-165-102 sshd[11976]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:24:20 149-210-165-102 sshd[11980]: Invalid user build from 42.193.54.22 Apr 25 02:24:20 149-210-165-102 sshd[11981]: input_userauth_request: invalid user build Apr 25 02:24:20 149-210-165-102 sshd[11980]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:24:20 149-210-165-102 sshd[11980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:24:21 149-210-165-102 sshd[11978]: Failed password for invalid user umulus from 186.210.115.15 port 56428 ssh2 Apr 25 02:24:21 149-210-165-102 sshd[11979]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:24:22 149-210-165-102 sshd[11980]: Failed password for invalid user build from 42.193.54.22 port 60978 ssh2 Apr 25 02:24:22 149-210-165-102 sshd[11981]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:24:32 149-210-165-102 sshd[11985]: Invalid user den from 199.195.252.236 Apr 25 02:24:32 149-210-165-102 sshd[11986]: input_userauth_request: invalid user den Apr 25 02:24:32 149-210-165-102 sshd[11985]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:24:32 149-210-165-102 sshd[11985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:24:34 149-210-165-102 sshd[11985]: Failed password for invalid user den from 199.195.252.236 port 59578 ssh2 Apr 25 02:24:34 149-210-165-102 sshd[11986]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:24:56 149-210-165-102 sshd[11993]: Invalid user www from 121.4.71.96 Apr 25 02:24:56 149-210-165-102 sshd[11994]: input_userauth_request: invalid user www Apr 25 02:24:56 149-210-165-102 sshd[11993]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:24:56 149-210-165-102 sshd[11993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:24:57 149-210-165-102 sshd[11993]: Failed password for invalid user www from 121.4.71.96 port 36464 ssh2 Apr 25 02:24:58 149-210-165-102 sshd[11994]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:25:08 149-210-165-102 sshd[12001]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:25:08 149-210-165-102 sshd[12001]: Invalid user admin from 122.252.231.138 Apr 25 02:25:08 149-210-165-102 sshd[12002]: input_userauth_request: invalid user admin Apr 25 02:25:08 149-210-165-102 sshd[12001]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:25:08 149-210-165-102 sshd[12001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:25:09 149-210-165-102 sshd[12001]: Failed password for invalid user admin from 122.252.231.138 port 33866 ssh2 Apr 25 02:25:09 149-210-165-102 sshd[12002]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:25:27 149-210-165-102 sshd[12014]: Invalid user java from 45.248.68.206 Apr 25 02:25:27 149-210-165-102 sshd[12015]: input_userauth_request: invalid user java Apr 25 02:25:27 149-210-165-102 sshd[12014]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:25:27 149-210-165-102 sshd[12014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:25:29 149-210-165-102 sshd[12014]: Failed password for invalid user java from 45.248.68.206 port 54330 ssh2 Apr 25 02:25:29 149-210-165-102 sshd[12015]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:25:33 149-210-165-102 sshd[12017]: Invalid user tiago from 178.128.210.45 Apr 25 02:25:33 149-210-165-102 sshd[12018]: input_userauth_request: invalid user tiago Apr 25 02:25:33 149-210-165-102 sshd[12017]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:25:33 149-210-165-102 sshd[12017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:25:35 149-210-165-102 sshd[12017]: Failed password for invalid user tiago from 178.128.210.45 port 60482 ssh2 Apr 25 02:25:35 149-210-165-102 sshd[12022]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:25:35 149-210-165-102 sshd[12018]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:25:35 149-210-165-102 sshd[12022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:25:38 149-210-165-102 sshd[12022]: Failed password for root from 186.206.157.74 port 22104 ssh2 Apr 25 02:25:38 149-210-165-102 sshd[12023]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:25:54 149-210-165-102 sshd[12041]: Invalid user teamspeak3 from 42.193.54.22 Apr 25 02:25:54 149-210-165-102 sshd[12042]: input_userauth_request: invalid user teamspeak3 Apr 25 02:25:55 149-210-165-102 sshd[12041]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:25:55 149-210-165-102 sshd[12041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:25:56 149-210-165-102 sshd[12041]: Failed password for invalid user teamspeak3 from 42.193.54.22 port 57148 ssh2 Apr 25 02:25:56 149-210-165-102 sshd[12042]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:25:59 149-210-165-102 sshd[12044]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:25:59 149-210-165-102 sshd[12044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 02:26:02 149-210-165-102 sshd[12044]: Failed password for root from 177.134.160.29 port 46124 ssh2 Apr 25 02:26:02 149-210-165-102 sshd[12045]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:26:06 149-210-165-102 sshd[12049]: Invalid user sanchez from 154.8.233.56 Apr 25 02:26:06 149-210-165-102 sshd[12050]: input_userauth_request: invalid user sanchez Apr 25 02:26:06 149-210-165-102 sshd[12049]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:06 149-210-165-102 sshd[12049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:26:09 149-210-165-102 sshd[12049]: Failed password for invalid user sanchez from 154.8.233.56 port 39394 ssh2 Apr 25 02:26:09 149-210-165-102 sshd[12050]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:26:17 149-210-165-102 sshd[12058]: Invalid user app from 124.156.239.240 Apr 25 02:26:17 149-210-165-102 sshd[12059]: input_userauth_request: invalid user app Apr 25 02:26:17 149-210-165-102 sshd[12058]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:17 149-210-165-102 sshd[12058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:26:19 149-210-165-102 sshd[12058]: Failed password for invalid user app from 124.156.239.240 port 39334 ssh2 Apr 25 02:26:20 149-210-165-102 sshd[12059]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:26:20 149-210-165-102 sshd[12062]: Invalid user sn from 199.195.252.236 Apr 25 02:26:20 149-210-165-102 sshd[12063]: input_userauth_request: invalid user sn Apr 25 02:26:20 149-210-165-102 sshd[12062]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:20 149-210-165-102 sshd[12062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:26:23 149-210-165-102 sshd[12062]: Failed password for invalid user sn from 199.195.252.236 port 36226 ssh2 Apr 25 02:26:23 149-210-165-102 sshd[12063]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:26:25 149-210-165-102 sshd[12068]: fatal: no matching cipher found: client chacha20-poly1305@openssh.com server aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se Apr 25 02:26:26 149-210-165-102 sshd[12067]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:26:26 149-210-165-102 sshd[12067]: Invalid user cronuser from 186.210.115.15 Apr 25 02:26:26 149-210-165-102 sshd[12069]: input_userauth_request: invalid user cronuser Apr 25 02:26:26 149-210-165-102 sshd[12067]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:26 149-210-165-102 sshd[12067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:26:28 149-210-165-102 sshd[12067]: Failed password for invalid user cronuser from 186.210.115.15 port 58936 ssh2 Apr 25 02:26:28 149-210-165-102 sshd[12069]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:26:41 149-210-165-102 sshd[12060]: Invalid user user from 119.28.61.47 Apr 25 02:26:41 149-210-165-102 sshd[12061]: input_userauth_request: invalid user user Apr 25 02:26:41 149-210-165-102 sshd[12060]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:41 149-210-165-102 sshd[12060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:26:43 149-210-165-102 sshd[12060]: Failed password for invalid user user from 119.28.61.47 port 60132 ssh2 Apr 25 02:26:44 149-210-165-102 sshd[12061]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:26:46 149-210-165-102 sshd[12083]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:26:46 149-210-165-102 sshd[12083]: Invalid user teamspeak3 from 103.118.42.205 Apr 25 02:26:46 149-210-165-102 sshd[12084]: input_userauth_request: invalid user teamspeak3 Apr 25 02:26:46 149-210-165-102 sshd[12083]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:46 149-210-165-102 sshd[12083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:26:48 149-210-165-102 sshd[12083]: Failed password for invalid user teamspeak3 from 103.118.42.205 port 33304 ssh2 Apr 25 02:26:48 149-210-165-102 sshd[12084]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:26:51 149-210-165-102 sshd[12085]: Invalid user faro from 47.254.179.224 Apr 25 02:26:51 149-210-165-102 sshd[12086]: input_userauth_request: invalid user faro Apr 25 02:26:51 149-210-165-102 sshd[12085]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:51 149-210-165-102 sshd[12085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:26:53 149-210-165-102 sshd[12085]: Failed password for invalid user faro from 47.254.179.224 port 56826 ssh2 Apr 25 02:26:53 149-210-165-102 sshd[12086]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:26:57 149-210-165-102 sshd[12093]: Invalid user tracyf from 121.4.71.96 Apr 25 02:26:57 149-210-165-102 sshd[12094]: input_userauth_request: invalid user tracyf Apr 25 02:26:57 149-210-165-102 sshd[12093]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:26:57 149-210-165-102 sshd[12093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:26:59 149-210-165-102 sshd[12093]: Failed password for invalid user tracyf from 121.4.71.96 port 58980 ssh2 Apr 25 02:26:59 149-210-165-102 sshd[12094]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:27:02 149-210-165-102 sshd[12095]: Invalid user user5 from 81.68.109.37 Apr 25 02:27:02 149-210-165-102 sshd[12096]: input_userauth_request: invalid user user5 Apr 25 02:27:02 149-210-165-102 sshd[12095]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:02 149-210-165-102 sshd[12095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:27:04 149-210-165-102 sshd[12095]: Failed password for invalid user user5 from 81.68.109.37 port 54190 ssh2 Apr 25 02:27:04 149-210-165-102 sshd[12096]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:27:13 149-210-165-102 sshd[12100]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:27:13 149-210-165-102 sshd[12100]: Invalid user parsa from 186.206.157.74 Apr 25 02:27:13 149-210-165-102 sshd[12101]: input_userauth_request: invalid user parsa Apr 25 02:27:13 149-210-165-102 sshd[12100]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:13 149-210-165-102 sshd[12100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:27:14 149-210-165-102 sshd[12100]: Failed password for invalid user parsa from 186.206.157.74 port 15517 ssh2 Apr 25 02:27:14 149-210-165-102 sshd[12101]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:27:26 149-210-165-102 sshd[12104]: Invalid user gs from 42.193.54.22 Apr 25 02:27:26 149-210-165-102 sshd[12106]: input_userauth_request: invalid user gs Apr 25 02:27:26 149-210-165-102 sshd[12104]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:26 149-210-165-102 sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:27:28 149-210-165-102 sshd[12104]: Failed password for invalid user gs from 42.193.54.22 port 53302 ssh2 Apr 25 02:27:28 149-210-165-102 sshd[12106]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:27:38 149-210-165-102 sshd[12112]: Invalid user virtuoso from 45.248.68.206 Apr 25 02:27:38 149-210-165-102 sshd[12113]: input_userauth_request: invalid user virtuoso Apr 25 02:27:38 149-210-165-102 sshd[12112]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:38 149-210-165-102 sshd[12112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:27:40 149-210-165-102 sshd[12114]: Invalid user bgp from 42.192.118.249 Apr 25 02:27:40 149-210-165-102 sshd[12115]: input_userauth_request: invalid user bgp Apr 25 02:27:40 149-210-165-102 sshd[12114]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:40 149-210-165-102 sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:27:40 149-210-165-102 sshd[12112]: Failed password for invalid user virtuoso from 45.248.68.206 port 52760 ssh2 Apr 25 02:27:42 149-210-165-102 sshd[12114]: Failed password for invalid user bgp from 42.192.118.249 port 56408 ssh2 Apr 25 02:27:42 149-210-165-102 sshd[12115]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:27:43 149-210-165-102 sshd[12113]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:27:50 149-210-165-102 sshd[12122]: Invalid user cathy from 121.5.166.237 Apr 25 02:27:50 149-210-165-102 sshd[12124]: input_userauth_request: invalid user cathy Apr 25 02:27:50 149-210-165-102 sshd[12122]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:50 149-210-165-102 sshd[12122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:27:50 149-210-165-102 sshd[12116]: Invalid user user1 from 150.109.252.206 Apr 25 02:27:50 149-210-165-102 sshd[12117]: input_userauth_request: invalid user user1 Apr 25 02:27:50 149-210-165-102 sshd[12116]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:27:50 149-210-165-102 sshd[12116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:27:52 149-210-165-102 sshd[12122]: Failed password for invalid user cathy from 121.5.166.237 port 37176 ssh2 Apr 25 02:27:52 149-210-165-102 sshd[12116]: Failed password for invalid user user1 from 150.109.252.206 port 47372 ssh2 Apr 25 02:27:52 149-210-165-102 sshd[12124]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:27:52 149-210-165-102 sshd[12117]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:27:57 149-210-165-102 sshd[12127]: Connection closed by 129.146.140.161 Apr 25 02:28:01 149-210-165-102 sshd[12134]: Invalid user jenkins from 178.128.210.45 Apr 25 02:28:01 149-210-165-102 sshd[12135]: input_userauth_request: invalid user jenkins Apr 25 02:28:01 149-210-165-102 sshd[12134]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:01 149-210-165-102 sshd[12134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:28:02 149-210-165-102 sshd[12134]: Failed password for invalid user jenkins from 178.128.210.45 port 34080 ssh2 Apr 25 02:28:02 149-210-165-102 sshd[12135]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:28:08 149-210-165-102 sshd[12147]: Invalid user admin from 199.195.252.236 Apr 25 02:28:08 149-210-165-102 sshd[12148]: input_userauth_request: invalid user admin Apr 25 02:28:08 149-210-165-102 sshd[12147]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:08 149-210-165-102 sshd[12147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:28:10 149-210-165-102 sshd[12147]: Failed password for invalid user admin from 199.195.252.236 port 41108 ssh2 Apr 25 02:28:10 149-210-165-102 sshd[12148]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:28:30 149-210-165-102 sshd[12166]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:28:30 149-210-165-102 sshd[12166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:28:31 149-210-165-102 sshd[12168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 user=root Apr 25 02:28:32 149-210-165-102 sshd[12166]: Failed password for root from 186.210.115.15 port 33220 ssh2 Apr 25 02:28:32 149-210-165-102 sshd[12167]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:28:32 149-210-165-102 sshd[12168]: Failed password for root from 124.156.239.240 port 48282 ssh2 Apr 25 02:28:33 149-210-165-102 sshd[12169]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:28:39 149-210-165-102 sshd[12173]: Invalid user mp3 from 154.8.233.56 Apr 25 02:28:39 149-210-165-102 sshd[12174]: input_userauth_request: invalid user mp3 Apr 25 02:28:39 149-210-165-102 sshd[12173]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:39 149-210-165-102 sshd[12173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:28:41 149-210-165-102 sshd[12175]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:28:41 149-210-165-102 sshd[12175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 user=root Apr 25 02:28:42 149-210-165-102 sshd[12173]: Failed password for invalid user mp3 from 154.8.233.56 port 40928 ssh2 Apr 25 02:28:42 149-210-165-102 sshd[12174]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:28:43 149-210-165-102 sshd[12175]: Failed password for root from 122.252.231.138 port 60864 ssh2 Apr 25 02:28:43 149-210-165-102 sshd[12176]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:28:50 149-210-165-102 sshd[12184]: Invalid user admin from 180.76.134.229 Apr 25 02:28:50 149-210-165-102 sshd[12185]: input_userauth_request: invalid user admin Apr 25 02:28:50 149-210-165-102 sshd[12184]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:50 149-210-165-102 sshd[12184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:28:52 149-210-165-102 sshd[12184]: Failed password for invalid user admin from 180.76.134.229 port 47732 ssh2 Apr 25 02:28:52 149-210-165-102 sshd[12185]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:28:55 149-210-165-102 sshd[12188]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:28:55 149-210-165-102 sshd[12188]: Invalid user admin from 186.206.157.74 Apr 25 02:28:55 149-210-165-102 sshd[12189]: input_userauth_request: invalid user admin Apr 25 02:28:55 149-210-165-102 sshd[12188]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:55 149-210-165-102 sshd[12188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:28:57 149-210-165-102 sshd[12188]: Failed password for invalid user admin from 186.206.157.74 port 32816 ssh2 Apr 25 02:28:58 149-210-165-102 sshd[12189]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:28:59 149-210-165-102 sshd[12194]: Invalid user test123 from 42.192.118.249 Apr 25 02:28:59 149-210-165-102 sshd[12195]: input_userauth_request: invalid user test123 Apr 25 02:28:59 149-210-165-102 sshd[12194]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:28:59 149-210-165-102 sshd[12194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:29:02 149-210-165-102 sshd[12194]: Failed password for invalid user test123 from 42.192.118.249 port 47678 ssh2 Apr 25 02:29:02 149-210-165-102 sshd[12195]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:29:02 149-210-165-102 sshd[12196]: Invalid user dasusr1 from 42.193.54.22 Apr 25 02:29:02 149-210-165-102 sshd[12197]: input_userauth_request: invalid user dasusr1 Apr 25 02:29:02 149-210-165-102 sshd[12196]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:02 149-210-165-102 sshd[12196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:29:04 149-210-165-102 sshd[12196]: Failed password for invalid user dasusr1 from 42.193.54.22 port 49448 ssh2 Apr 25 02:29:05 149-210-165-102 sshd[12197]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:29:05 149-210-165-102 sshd[12200]: Invalid user ts3 from 121.5.23.61 Apr 25 02:29:05 149-210-165-102 sshd[12201]: input_userauth_request: invalid user ts3 Apr 25 02:29:05 149-210-165-102 sshd[12200]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:05 149-210-165-102 sshd[12200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 02:29:07 149-210-165-102 sshd[12200]: Failed password for invalid user ts3 from 121.5.23.61 port 58970 ssh2 Apr 25 02:29:07 149-210-165-102 sshd[12201]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:29:10 149-210-165-102 sshd[12204]: Invalid user asl from 121.4.71.96 Apr 25 02:29:10 149-210-165-102 sshd[12206]: input_userauth_request: invalid user asl Apr 25 02:29:10 149-210-165-102 sshd[12204]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:10 149-210-165-102 sshd[12204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:29:12 149-210-165-102 sshd[12204]: Failed password for invalid user asl from 121.4.71.96 port 53314 ssh2 Apr 25 02:29:13 149-210-165-102 sshd[12206]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:29:33 149-210-165-102 sshd[12218]: Invalid user gao from 119.28.61.47 Apr 25 02:29:33 149-210-165-102 sshd[12219]: input_userauth_request: invalid user gao Apr 25 02:29:33 149-210-165-102 sshd[12218]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:33 149-210-165-102 sshd[12218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:29:36 149-210-165-102 sshd[12218]: Failed password for invalid user gao from 119.28.61.47 port 57014 ssh2 Apr 25 02:29:36 149-210-165-102 sshd[12219]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:29:36 149-210-165-102 sshd[12224]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:29:36 149-210-165-102 sshd[12224]: Invalid user aleon from 177.134.160.29 Apr 25 02:29:36 149-210-165-102 sshd[12225]: input_userauth_request: invalid user aleon Apr 25 02:29:36 149-210-165-102 sshd[12224]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:36 149-210-165-102 sshd[12224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:29:38 149-210-165-102 sshd[12224]: Failed password for invalid user aleon from 177.134.160.29 port 37392 ssh2 Apr 25 02:29:38 149-210-165-102 sshd[12225]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:29:41 149-210-165-102 sshd[12229]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:29:41 149-210-165-102 sshd[12229]: Invalid user lobo from 103.118.42.205 Apr 25 02:29:41 149-210-165-102 sshd[12230]: input_userauth_request: invalid user lobo Apr 25 02:29:41 149-210-165-102 sshd[12229]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:41 149-210-165-102 sshd[12229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:29:43 149-210-165-102 sshd[12229]: Failed password for invalid user lobo from 103.118.42.205 port 58230 ssh2 Apr 25 02:29:43 149-210-165-102 sshd[12230]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:29:50 149-210-165-102 sshd[12238]: Invalid user pen from 45.248.68.206 Apr 25 02:29:50 149-210-165-102 sshd[12239]: input_userauth_request: invalid user pen Apr 25 02:29:50 149-210-165-102 sshd[12238]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:50 149-210-165-102 sshd[12238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:29:51 149-210-165-102 sshd[12240]: Invalid user beamer from 47.254.179.224 Apr 25 02:29:51 149-210-165-102 sshd[12241]: input_userauth_request: invalid user beamer Apr 25 02:29:51 149-210-165-102 sshd[12240]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:51 149-210-165-102 sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:29:52 149-210-165-102 sshd[12238]: Failed password for invalid user pen from 45.248.68.206 port 51200 ssh2 Apr 25 02:29:52 149-210-165-102 sshd[12239]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:29:53 149-210-165-102 sshd[12240]: Failed password for invalid user beamer from 47.254.179.224 port 39492 ssh2 Apr 25 02:29:53 149-210-165-102 sshd[12241]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:29:54 149-210-165-102 sshd[12243]: Invalid user student4 from 199.195.252.236 Apr 25 02:29:54 149-210-165-102 sshd[12244]: input_userauth_request: invalid user student4 Apr 25 02:29:54 149-210-165-102 sshd[12243]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:29:54 149-210-165-102 sshd[12243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:29:56 149-210-165-102 sshd[12243]: Failed password for invalid user student4 from 199.195.252.236 port 45992 ssh2 Apr 25 02:29:56 149-210-165-102 sshd[12244]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:30:05 149-210-165-102 sshd[12276]: Invalid user test8 from 81.68.109.37 Apr 25 02:30:05 149-210-165-102 sshd[12280]: input_userauth_request: invalid user test8 Apr 25 02:30:05 149-210-165-102 sshd[12276]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:30:05 149-210-165-102 sshd[12276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:30:07 149-210-165-102 sshd[12276]: Failed password for invalid user test8 from 81.68.109.37 port 58120 ssh2 Apr 25 02:30:07 149-210-165-102 sshd[12280]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:30:15 149-210-165-102 sshd[12286]: Invalid user omega from 178.128.210.45 Apr 25 02:30:15 149-210-165-102 sshd[12287]: input_userauth_request: invalid user omega Apr 25 02:30:15 149-210-165-102 sshd[12286]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:30:15 149-210-165-102 sshd[12286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:30:17 149-210-165-102 sshd[12289]: Invalid user administrador from 42.192.118.249 Apr 25 02:30:17 149-210-165-102 sshd[12290]: input_userauth_request: invalid user administrador Apr 25 02:30:17 149-210-165-102 sshd[12289]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:30:17 149-210-165-102 sshd[12289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:30:17 149-210-165-102 sshd[12286]: Failed password for invalid user omega from 178.128.210.45 port 35906 ssh2 Apr 25 02:30:18 149-210-165-102 sshd[12287]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:30:20 149-210-165-102 sshd[12289]: Failed password for invalid user administrador from 42.192.118.249 port 38944 ssh2 Apr 25 02:30:20 149-210-165-102 sshd[12290]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:30:35 149-210-165-102 sshd[12298]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:30:35 149-210-165-102 sshd[12298]: Invalid user rc from 186.206.157.74 Apr 25 02:30:35 149-210-165-102 sshd[12299]: input_userauth_request: invalid user rc Apr 25 02:30:35 149-210-165-102 sshd[12298]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:30:35 149-210-165-102 sshd[12298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:30:35 149-210-165-102 sshd[12300]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:30:35 149-210-165-102 sshd[12300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:30:35 149-210-165-102 sshd[12302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 user=ftp Apr 25 02:30:37 149-210-165-102 sshd[12298]: Failed password for invalid user rc from 186.206.157.74 port 31461 ssh2 Apr 25 02:30:37 149-210-165-102 sshd[12300]: Failed password for root from 186.210.115.15 port 35736 ssh2 Apr 25 02:30:37 149-210-165-102 sshd[12301]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:30:37 149-210-165-102 sshd[12302]: Failed password for ftp from 42.193.54.22 port 45604 ssh2 Apr 25 02:30:38 149-210-165-102 sshd[12303]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:30:40 149-210-165-102 sshd[12299]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:30:42 149-210-165-102 sshd[12305]: Invalid user tom from 124.156.239.240 Apr 25 02:30:42 149-210-165-102 sshd[12306]: input_userauth_request: invalid user tom Apr 25 02:30:42 149-210-165-102 sshd[12305]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:30:42 149-210-165-102 sshd[12305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:30:44 149-210-165-102 sshd[12305]: Failed password for invalid user tom from 124.156.239.240 port 57256 ssh2 Apr 25 02:30:44 149-210-165-102 sshd[12306]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:31:10 149-210-165-102 sshd[12325]: Invalid user sonny from 121.4.71.96 Apr 25 02:31:10 149-210-165-102 sshd[12326]: input_userauth_request: invalid user sonny Apr 25 02:31:10 149-210-165-102 sshd[12325]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:10 149-210-165-102 sshd[12325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:31:11 149-210-165-102 sshd[12325]: Failed password for invalid user sonny from 121.4.71.96 port 47636 ssh2 Apr 25 02:31:12 149-210-165-102 sshd[12330]: Invalid user ari from 154.8.233.56 Apr 25 02:31:12 149-210-165-102 sshd[12331]: input_userauth_request: invalid user ari Apr 25 02:31:12 149-210-165-102 sshd[12330]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:12 149-210-165-102 sshd[12330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:31:12 149-210-165-102 sshd[12326]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:31:14 149-210-165-102 sshd[12330]: Failed password for invalid user ari from 154.8.233.56 port 42464 ssh2 Apr 25 02:31:14 149-210-165-102 sshd[12331]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:31:22 149-210-165-102 sshd[12344]: Invalid user ubuntu from 170.106.100.61 Apr 25 02:31:22 149-210-165-102 sshd[12345]: input_userauth_request: invalid user ubuntu Apr 25 02:31:22 149-210-165-102 sshd[12344]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:22 149-210-165-102 sshd[12344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:31:23 149-210-165-102 sshd[12344]: Failed password for invalid user ubuntu from 170.106.100.61 port 56930 ssh2 Apr 25 02:31:23 149-210-165-102 sshd[12345]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:31:24 149-210-165-102 sshd[12333]: Connection closed by 121.5.166.237 Apr 25 02:31:27 149-210-165-102 sshd[12348]: Invalid user test1 from 180.76.134.229 Apr 25 02:31:27 149-210-165-102 sshd[12349]: input_userauth_request: invalid user test1 Apr 25 02:31:27 149-210-165-102 sshd[12348]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:27 149-210-165-102 sshd[12348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:31:29 149-210-165-102 sshd[12348]: Failed password for invalid user test1 from 180.76.134.229 port 52372 ssh2 Apr 25 02:31:29 149-210-165-102 sshd[12349]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:31:39 149-210-165-102 sshd[12358]: Invalid user nano from 42.192.118.249 Apr 25 02:31:39 149-210-165-102 sshd[12359]: input_userauth_request: invalid user nano Apr 25 02:31:39 149-210-165-102 sshd[12358]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:39 149-210-165-102 sshd[12358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:31:41 149-210-165-102 sshd[12358]: Failed password for invalid user nano from 42.192.118.249 port 58448 ssh2 Apr 25 02:31:41 149-210-165-102 sshd[12359]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:31:44 149-210-165-102 sshd[12362]: Invalid user rabbitmq from 199.195.252.236 Apr 25 02:31:44 149-210-165-102 sshd[12363]: input_userauth_request: invalid user rabbitmq Apr 25 02:31:44 149-210-165-102 sshd[12362]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:44 149-210-165-102 sshd[12362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:31:46 149-210-165-102 sshd[12362]: Failed password for invalid user rabbitmq from 199.195.252.236 port 50872 ssh2 Apr 25 02:31:46 149-210-165-102 sshd[12363]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:31:52 149-210-165-102 sshd[12364]: Invalid user vncuser from 140.143.230.41 Apr 25 02:31:52 149-210-165-102 sshd[12365]: input_userauth_request: invalid user vncuser Apr 25 02:31:52 149-210-165-102 sshd[12364]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:31:52 149-210-165-102 sshd[12364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:31:54 149-210-165-102 sshd[12364]: Failed password for invalid user vncuser from 140.143.230.41 port 56796 ssh2 Apr 25 02:31:54 149-210-165-102 sshd[12365]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:32:00 149-210-165-102 sshd[12376]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:32:00 149-210-165-102 sshd[12376]: Invalid user adrian from 103.118.42.205 Apr 25 02:32:00 149-210-165-102 sshd[12377]: input_userauth_request: invalid user adrian Apr 25 02:32:00 149-210-165-102 sshd[12376]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:00 149-210-165-102 sshd[12376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:32:02 149-210-165-102 sshd[12376]: Failed password for invalid user adrian from 103.118.42.205 port 48076 ssh2 Apr 25 02:32:02 149-210-165-102 sshd[12377]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:32:10 149-210-165-102 sshd[12389]: Connection closed by 45.248.68.206 Apr 25 02:32:10 149-210-165-102 sshd[12383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 user=root Apr 25 02:32:11 149-210-165-102 sshd[12384]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:32:11 149-210-165-102 sshd[12384]: Invalid user q3server from 186.206.157.74 Apr 25 02:32:11 149-210-165-102 sshd[12386]: input_userauth_request: invalid user q3server Apr 25 02:32:11 149-210-165-102 sshd[12384]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:11 149-210-165-102 sshd[12384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:32:11 149-210-165-102 sshd[12388]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:32:11 149-210-165-102 sshd[12388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 user=root Apr 25 02:32:12 149-210-165-102 sshd[12383]: Failed password for root from 42.193.54.22 port 41784 ssh2 Apr 25 02:32:12 149-210-165-102 sshd[12385]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:32:13 149-210-165-102 sshd[12384]: Failed password for invalid user q3server from 186.206.157.74 port 38393 ssh2 Apr 25 02:32:13 149-210-165-102 sshd[12388]: Failed password for root from 122.252.231.138 port 59684 ssh2 Apr 25 02:32:14 149-210-165-102 sshd[12390]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:32:14 149-210-165-102 sshd[12386]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:32:16 149-210-165-102 sshd[12392]: Invalid user totto from 150.109.252.206 Apr 25 02:32:16 149-210-165-102 sshd[12393]: input_userauth_request: invalid user totto Apr 25 02:32:16 149-210-165-102 sshd[12392]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:16 149-210-165-102 sshd[12392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:32:17 149-210-165-102 sshd[12392]: Failed password for invalid user totto from 150.109.252.206 port 49428 ssh2 Apr 25 02:32:17 149-210-165-102 sshd[12393]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:32:35 149-210-165-102 sshd[12397]: Invalid user trash from 178.128.210.45 Apr 25 02:32:35 149-210-165-102 sshd[12398]: input_userauth_request: invalid user trash Apr 25 02:32:35 149-210-165-102 sshd[12397]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:35 149-210-165-102 sshd[12397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:32:37 149-210-165-102 sshd[12397]: Failed password for invalid user trash from 178.128.210.45 port 37734 ssh2 Apr 25 02:32:37 149-210-165-102 sshd[12398]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:32:41 149-210-165-102 sshd[12399]: Invalid user archiv from 119.28.61.47 Apr 25 02:32:41 149-210-165-102 sshd[12400]: input_userauth_request: invalid user archiv Apr 25 02:32:41 149-210-165-102 sshd[12399]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:41 149-210-165-102 sshd[12399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:32:43 149-210-165-102 sshd[12399]: Failed password for invalid user archiv from 119.28.61.47 port 53792 ssh2 Apr 25 02:32:43 149-210-165-102 sshd[12400]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:32:46 149-210-165-102 sshd[12403]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:32:46 149-210-165-102 sshd[12403]: Invalid user ares from 186.210.115.15 Apr 25 02:32:46 149-210-165-102 sshd[12404]: input_userauth_request: invalid user ares Apr 25 02:32:46 149-210-165-102 sshd[12403]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:46 149-210-165-102 sshd[12403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:32:48 149-210-165-102 sshd[12403]: Failed password for invalid user ares from 186.210.115.15 port 38246 ssh2 Apr 25 02:32:48 149-210-165-102 sshd[12404]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:32:53 149-210-165-102 sshd[12411]: Invalid user aos from 47.254.179.224 Apr 25 02:32:53 149-210-165-102 sshd[12412]: input_userauth_request: invalid user aos Apr 25 02:32:53 149-210-165-102 sshd[12411]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:53 149-210-165-102 sshd[12411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:32:55 149-210-165-102 sshd[12411]: Failed password for invalid user aos from 47.254.179.224 port 50404 ssh2 Apr 25 02:32:55 149-210-165-102 sshd[12412]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:32:55 149-210-165-102 sshd[12413]: Invalid user prueba from 42.192.118.249 Apr 25 02:32:55 149-210-165-102 sshd[12414]: input_userauth_request: invalid user prueba Apr 25 02:32:55 149-210-165-102 sshd[12413]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:55 149-210-165-102 sshd[12413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:32:56 149-210-165-102 sshd[12415]: Invalid user testftp from 124.156.239.240 Apr 25 02:32:56 149-210-165-102 sshd[12418]: input_userauth_request: invalid user testftp Apr 25 02:32:56 149-210-165-102 sshd[12415]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:32:56 149-210-165-102 sshd[12415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:32:57 149-210-165-102 sshd[12413]: Failed password for invalid user prueba from 42.192.118.249 port 49714 ssh2 Apr 25 02:32:57 149-210-165-102 sshd[12414]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:32:57 149-210-165-102 sshd[12415]: Failed password for invalid user testftp from 124.156.239.240 port 37982 ssh2 Apr 25 02:32:57 149-210-165-102 sshd[12418]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:33:03 149-210-165-102 sshd[12422]: Invalid user vnc from 81.68.109.37 Apr 25 02:33:03 149-210-165-102 sshd[12424]: input_userauth_request: invalid user vnc Apr 25 02:33:03 149-210-165-102 sshd[12422]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:03 149-210-165-102 sshd[12422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:33:05 149-210-165-102 sshd[12422]: Failed password for invalid user vnc from 81.68.109.37 port 33802 ssh2 Apr 25 02:33:05 149-210-165-102 sshd[12424]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:33:07 149-210-165-102 sshd[12431]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:33:07 149-210-165-102 sshd[12431]: Invalid user jtorres from 177.134.160.29 Apr 25 02:33:07 149-210-165-102 sshd[12432]: input_userauth_request: invalid user jtorres Apr 25 02:33:07 149-210-165-102 sshd[12431]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:07 149-210-165-102 sshd[12431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:33:09 149-210-165-102 sshd[12431]: Failed password for invalid user jtorres from 177.134.160.29 port 56899 ssh2 Apr 25 02:33:09 149-210-165-102 sshd[12432]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:33:09 149-210-165-102 sshd[12429]: Invalid user glenn from 121.4.71.96 Apr 25 02:33:09 149-210-165-102 sshd[12430]: input_userauth_request: invalid user glenn Apr 25 02:33:09 149-210-165-102 sshd[12429]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:09 149-210-165-102 sshd[12429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:33:11 149-210-165-102 sshd[12429]: Failed password for invalid user glenn from 121.4.71.96 port 41928 ssh2 Apr 25 02:33:12 149-210-165-102 sshd[12430]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:33:38 149-210-165-102 sshd[12447]: Invalid user sistema from 154.8.233.56 Apr 25 02:33:38 149-210-165-102 sshd[12448]: input_userauth_request: invalid user sistema Apr 25 02:33:38 149-210-165-102 sshd[12447]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:38 149-210-165-102 sshd[12447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:33:39 149-210-165-102 sshd[12454]: Invalid user patricia from 199.195.252.236 Apr 25 02:33:39 149-210-165-102 sshd[12456]: input_userauth_request: invalid user patricia Apr 25 02:33:39 149-210-165-102 sshd[12454]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:39 149-210-165-102 sshd[12454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:33:40 149-210-165-102 sshd[12447]: Failed password for invalid user sistema from 154.8.233.56 port 43998 ssh2 Apr 25 02:33:40 149-210-165-102 sshd[12448]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:33:41 149-210-165-102 sshd[12454]: Failed password for invalid user patricia from 199.195.252.236 port 55754 ssh2 Apr 25 02:33:42 149-210-165-102 sshd[12456]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:33:43 149-210-165-102 sshd[12457]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:33:43 149-210-165-102 sshd[12457]: Invalid user oracle from 186.206.157.74 Apr 25 02:33:43 149-210-165-102 sshd[12458]: input_userauth_request: invalid user oracle Apr 25 02:33:43 149-210-165-102 sshd[12457]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:43 149-210-165-102 sshd[12457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:33:43 149-210-165-102 sshd[12452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 user=root Apr 25 02:33:45 149-210-165-102 sshd[12457]: Failed password for invalid user oracle from 186.206.157.74 port 18100 ssh2 Apr 25 02:33:45 149-210-165-102 sshd[12452]: Failed password for root from 129.146.140.161 port 34480 ssh2 Apr 25 02:33:45 149-210-165-102 sshd[12453]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:33:46 149-210-165-102 sshd[12458]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:33:47 149-210-165-102 sshd[12460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 user=root Apr 25 02:33:49 149-210-165-102 sshd[12460]: Failed password for root from 42.193.54.22 port 37936 ssh2 Apr 25 02:33:49 149-210-165-102 sshd[12462]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:33:51 149-210-165-102 sshd[12465]: Invalid user a4 from 180.76.134.229 Apr 25 02:33:51 149-210-165-102 sshd[12467]: input_userauth_request: invalid user a4 Apr 25 02:33:51 149-210-165-102 sshd[12465]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:33:51 149-210-165-102 sshd[12465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:33:53 149-210-165-102 sshd[12465]: Failed password for invalid user a4 from 180.76.134.229 port 57020 ssh2 Apr 25 02:33:53 149-210-165-102 sshd[12467]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:34:06 149-210-165-102 sshd[12474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 02:34:08 149-210-165-102 sshd[12474]: Failed password for root from 152.136.122.126 port 15550 ssh2 Apr 25 02:34:08 149-210-165-102 sshd[12476]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:34:10 149-210-165-102 sshd[12478]: Invalid user looker from 42.192.118.249 Apr 25 02:34:10 149-210-165-102 sshd[12480]: input_userauth_request: invalid user looker Apr 25 02:34:10 149-210-165-102 sshd[12478]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:34:10 149-210-165-102 sshd[12478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:34:12 149-210-165-102 sshd[12478]: Failed password for invalid user looker from 42.192.118.249 port 40972 ssh2 Apr 25 02:34:12 149-210-165-102 sshd[12480]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:34:13 149-210-165-102 sshd[12481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 user=root Apr 25 02:34:15 149-210-165-102 sshd[12481]: Failed password for root from 170.106.100.61 port 33422 ssh2 Apr 25 02:34:15 149-210-165-102 sshd[12482]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:34:16 149-210-165-102 sshd[12484]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:34:16 149-210-165-102 sshd[12484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 user=root Apr 25 02:34:17 149-210-165-102 sshd[12484]: Failed password for root from 103.118.42.205 port 37734 ssh2 Apr 25 02:34:18 149-210-165-102 sshd[12485]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:34:21 149-210-165-102 sshd[12487]: Did not receive identification string from 45.248.68.206 Apr 25 02:34:39 149-210-165-102 sshd[12494]: Invalid user shao from 121.5.166.237 Apr 25 02:34:39 149-210-165-102 sshd[12495]: input_userauth_request: invalid user shao Apr 25 02:34:39 149-210-165-102 sshd[12494]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:34:39 149-210-165-102 sshd[12494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:34:42 149-210-165-102 sshd[12494]: Failed password for invalid user shao from 121.5.166.237 port 53368 ssh2 Apr 25 02:34:43 149-210-165-102 sshd[12495]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:34:50 149-210-165-102 sshd[12503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 user=root Apr 25 02:34:52 149-210-165-102 sshd[12503]: Failed password for root from 178.128.210.45 port 39570 ssh2 Apr 25 02:34:52 149-210-165-102 sshd[12504]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:34:58 149-210-165-102 sshd[12512]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:34:58 149-210-165-102 sshd[12512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:35:00 149-210-165-102 sshd[12512]: Failed password for root from 186.210.115.15 port 40764 ssh2 Apr 25 02:35:00 149-210-165-102 sshd[12513]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:35:03 149-210-165-102 sshd[12519]: Invalid user postgres from 124.156.239.240 Apr 25 02:35:03 149-210-165-102 sshd[12520]: input_userauth_request: invalid user postgres Apr 25 02:35:03 149-210-165-102 sshd[12519]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:03 149-210-165-102 sshd[12519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:35:05 149-210-165-102 sshd[12519]: Failed password for invalid user postgres from 124.156.239.240 port 46936 ssh2 Apr 25 02:35:06 149-210-165-102 sshd[12520]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:35:21 149-210-165-102 sshd[12535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 user=root Apr 25 02:35:23 149-210-165-102 sshd[12537]: Invalid user admin from 170.106.100.61 Apr 25 02:35:23 149-210-165-102 sshd[12538]: input_userauth_request: invalid user admin Apr 25 02:35:23 149-210-165-102 sshd[12537]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:23 149-210-165-102 sshd[12537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:35:23 149-210-165-102 sshd[12535]: Failed password for root from 42.193.54.22 port 34084 ssh2 Apr 25 02:35:23 149-210-165-102 sshd[12536]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:35:24 149-210-165-102 sshd[12539]: Invalid user support from 42.192.118.249 Apr 25 02:35:24 149-210-165-102 sshd[12540]: input_userauth_request: invalid user support Apr 25 02:35:24 149-210-165-102 sshd[12539]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:24 149-210-165-102 sshd[12539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:35:24 149-210-165-102 sshd[12537]: Failed password for invalid user admin from 170.106.100.61 port 53202 ssh2 Apr 25 02:35:25 149-210-165-102 sshd[12538]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:35:26 149-210-165-102 sshd[12539]: Failed password for invalid user support from 42.192.118.249 port 60476 ssh2 Apr 25 02:35:27 149-210-165-102 sshd[12540]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:35:30 149-210-165-102 sshd[12541]: Invalid user oracle from 140.143.230.41 Apr 25 02:35:30 149-210-165-102 sshd[12542]: input_userauth_request: invalid user oracle Apr 25 02:35:30 149-210-165-102 sshd[12541]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:30 149-210-165-102 sshd[12541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:35:31 149-210-165-102 sshd[12544]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:35:31 149-210-165-102 sshd[12544]: Invalid user vtcbikes from 186.206.157.74 Apr 25 02:35:31 149-210-165-102 sshd[12545]: input_userauth_request: invalid user vtcbikes Apr 25 02:35:31 149-210-165-102 sshd[12544]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:31 149-210-165-102 sshd[12544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:35:32 149-210-165-102 sshd[12541]: Failed password for invalid user oracle from 140.143.230.41 port 39288 ssh2 Apr 25 02:35:32 149-210-165-102 sshd[12542]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:35:33 149-210-165-102 sshd[12546]: Invalid user deploy from 199.195.252.236 Apr 25 02:35:33 149-210-165-102 sshd[12547]: input_userauth_request: invalid user deploy Apr 25 02:35:33 149-210-165-102 sshd[12546]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:33 149-210-165-102 sshd[12546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:35:33 149-210-165-102 sshd[12544]: Failed password for invalid user vtcbikes from 186.206.157.74 port 53794 ssh2 Apr 25 02:35:34 149-210-165-102 sshd[12545]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:35:35 149-210-165-102 sshd[12546]: Failed password for invalid user deploy from 199.195.252.236 port 60636 ssh2 Apr 25 02:35:35 149-210-165-102 sshd[12547]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:35:48 149-210-165-102 sshd[12557]: Invalid user white from 81.68.109.37 Apr 25 02:35:48 149-210-165-102 sshd[12559]: input_userauth_request: invalid user white Apr 25 02:35:48 149-210-165-102 sshd[12557]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:48 149-210-165-102 sshd[12557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:35:48 149-210-165-102 sshd[12555]: Invalid user kristen from 119.28.61.47 Apr 25 02:35:48 149-210-165-102 sshd[12558]: input_userauth_request: invalid user kristen Apr 25 02:35:48 149-210-165-102 sshd[12555]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:48 149-210-165-102 sshd[12555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:35:50 149-210-165-102 sshd[12557]: Failed password for invalid user white from 81.68.109.37 port 37706 ssh2 Apr 25 02:35:50 149-210-165-102 sshd[12555]: Failed password for invalid user kristen from 119.28.61.47 port 50504 ssh2 Apr 25 02:35:50 149-210-165-102 sshd[12558]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:35:51 149-210-165-102 sshd[12559]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:35:56 149-210-165-102 sshd[12562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=root Apr 25 02:35:58 149-210-165-102 sshd[12562]: Failed password for root from 47.254.179.224 port 33068 ssh2 Apr 25 02:35:58 149-210-165-102 sshd[12563]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:35:58 149-210-165-102 sshd[12565]: Invalid user adp from 152.136.122.126 Apr 25 02:35:58 149-210-165-102 sshd[12567]: input_userauth_request: invalid user adp Apr 25 02:35:58 149-210-165-102 sshd[12565]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:58 149-210-165-102 sshd[12565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:35:59 149-210-165-102 sshd[12564]: Invalid user rt from 154.8.233.56 Apr 25 02:35:59 149-210-165-102 sshd[12566]: input_userauth_request: invalid user rt Apr 25 02:35:59 149-210-165-102 sshd[12564]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:35:59 149-210-165-102 sshd[12564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:36:00 149-210-165-102 sshd[12565]: Failed password for invalid user adp from 152.136.122.126 port 51970 ssh2 Apr 25 02:36:01 149-210-165-102 sshd[12567]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:36:01 149-210-165-102 sshd[12564]: Failed password for invalid user rt from 154.8.233.56 port 45534 ssh2 Apr 25 02:36:01 149-210-165-102 sshd[12566]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:36:05 149-210-165-102 sshd[12569]: Invalid user doom from 180.76.134.229 Apr 25 02:36:05 149-210-165-102 sshd[12570]: input_userauth_request: invalid user doom Apr 25 02:36:05 149-210-165-102 sshd[12569]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:05 149-210-165-102 sshd[12569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:36:06 149-210-165-102 sshd[12569]: Failed password for invalid user doom from 180.76.134.229 port 33410 ssh2 Apr 25 02:36:07 149-210-165-102 sshd[12570]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:36:25 149-210-165-102 sshd[12579]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:36:25 149-210-165-102 sshd[12579]: Invalid user q from 103.118.42.205 Apr 25 02:36:25 149-210-165-102 sshd[12581]: input_userauth_request: invalid user q Apr 25 02:36:25 149-210-165-102 sshd[12579]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:25 149-210-165-102 sshd[12579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:36:26 149-210-165-102 sshd[12578]: Invalid user furukawa from 121.5.23.61 Apr 25 02:36:26 149-210-165-102 sshd[12580]: input_userauth_request: invalid user furukawa Apr 25 02:36:26 149-210-165-102 sshd[12578]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:26 149-210-165-102 sshd[12578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 02:36:28 149-210-165-102 sshd[12582]: Invalid user jordan from 45.248.68.206 Apr 25 02:36:28 149-210-165-102 sshd[12583]: input_userauth_request: invalid user jordan Apr 25 02:36:28 149-210-165-102 sshd[12582]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:28 149-210-165-102 sshd[12582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:36:28 149-210-165-102 sshd[12579]: Failed password for invalid user q from 103.118.42.205 port 55274 ssh2 Apr 25 02:36:28 149-210-165-102 sshd[12578]: Failed password for invalid user furukawa from 121.5.23.61 port 48790 ssh2 Apr 25 02:36:28 149-210-165-102 sshd[12581]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:36:28 149-210-165-102 sshd[12575]: Invalid user omega from 150.109.252.206 Apr 25 02:36:28 149-210-165-102 sshd[12577]: input_userauth_request: invalid user omega Apr 25 02:36:28 149-210-165-102 sshd[12575]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:28 149-210-165-102 sshd[12575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:36:28 149-210-165-102 sshd[12580]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:36:30 149-210-165-102 sshd[12582]: Failed password for invalid user jordan from 45.248.68.206 port 46496 ssh2 Apr 25 02:36:30 149-210-165-102 sshd[12583]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:36:30 149-210-165-102 sshd[12575]: Failed password for invalid user omega from 150.109.252.206 port 51478 ssh2 Apr 25 02:36:30 149-210-165-102 sshd[12577]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:36:31 149-210-165-102 sshd[12587]: Invalid user elliot from 170.106.100.61 Apr 25 02:36:31 149-210-165-102 sshd[12588]: input_userauth_request: invalid user elliot Apr 25 02:36:31 149-210-165-102 sshd[12587]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:31 149-210-165-102 sshd[12587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:36:33 149-210-165-102 sshd[12587]: Failed password for invalid user elliot from 170.106.100.61 port 44744 ssh2 Apr 25 02:36:33 149-210-165-102 sshd[12588]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:36:41 149-210-165-102 sshd[12592]: Invalid user carla from 42.192.118.249 Apr 25 02:36:41 149-210-165-102 sshd[12594]: input_userauth_request: invalid user carla Apr 25 02:36:41 149-210-165-102 sshd[12592]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:41 149-210-165-102 sshd[12592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:36:43 149-210-165-102 sshd[12592]: Failed password for invalid user carla from 42.192.118.249 port 51742 ssh2 Apr 25 02:36:44 149-210-165-102 sshd[12594]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:36:44 149-210-165-102 sshd[12595]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:36:44 149-210-165-102 sshd[12595]: Invalid user svn from 177.134.160.29 Apr 25 02:36:44 149-210-165-102 sshd[12596]: input_userauth_request: invalid user svn Apr 25 02:36:44 149-210-165-102 sshd[12595]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:44 149-210-165-102 sshd[12595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:36:47 149-210-165-102 sshd[12595]: Failed password for invalid user svn from 177.134.160.29 port 48191 ssh2 Apr 25 02:36:47 149-210-165-102 sshd[12596]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:36:55 149-210-165-102 sshd[12600]: Invalid user coco from 121.4.71.96 Apr 25 02:36:55 149-210-165-102 sshd[12601]: input_userauth_request: invalid user coco Apr 25 02:36:55 149-210-165-102 sshd[12600]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:36:55 149-210-165-102 sshd[12600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:36:57 149-210-165-102 sshd[12600]: Failed password for invalid user coco from 121.4.71.96 port 58710 ssh2 Apr 25 02:36:57 149-210-165-102 sshd[12601]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:37:00 149-210-165-102 sshd[12604]: Invalid user sistemas from 42.193.54.22 Apr 25 02:37:00 149-210-165-102 sshd[12605]: input_userauth_request: invalid user sistemas Apr 25 02:37:00 149-210-165-102 sshd[12604]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:00 149-210-165-102 sshd[12604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:37:01 149-210-165-102 sshd[12606]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:37:01 149-210-165-102 sshd[12606]: Invalid user space from 186.206.157.74 Apr 25 02:37:01 149-210-165-102 sshd[12607]: input_userauth_request: invalid user space Apr 25 02:37:01 149-210-165-102 sshd[12606]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:01 149-210-165-102 sshd[12606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:37:02 149-210-165-102 sshd[12604]: Failed password for invalid user sistemas from 42.193.54.22 port 58494 ssh2 Apr 25 02:37:02 149-210-165-102 sshd[12608]: Invalid user igor from 152.136.122.126 Apr 25 02:37:02 149-210-165-102 sshd[12609]: input_userauth_request: invalid user igor Apr 25 02:37:02 149-210-165-102 sshd[12608]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:02 149-210-165-102 sshd[12608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:37:03 149-210-165-102 sshd[12605]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:37:03 149-210-165-102 sshd[12606]: Failed password for invalid user space from 186.206.157.74 port 17613 ssh2 Apr 25 02:37:03 149-210-165-102 sshd[12607]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:37:05 149-210-165-102 sshd[12608]: Failed password for invalid user igor from 152.136.122.126 port 2510 ssh2 Apr 25 02:37:05 149-210-165-102 sshd[12609]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:37:07 149-210-165-102 sshd[12612]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:37:07 149-210-165-102 sshd[12612]: Invalid user dancer from 186.210.115.15 Apr 25 02:37:07 149-210-165-102 sshd[12613]: input_userauth_request: invalid user dancer Apr 25 02:37:07 149-210-165-102 sshd[12612]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:07 149-210-165-102 sshd[12612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:37:09 149-210-165-102 sshd[12612]: Failed password for invalid user dancer from 186.210.115.15 port 43282 ssh2 Apr 25 02:37:09 149-210-165-102 sshd[12613]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:37:13 149-210-165-102 sshd[12617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 user=root Apr 25 02:37:14 149-210-165-102 sshd[12619]: Invalid user neha from 178.128.210.45 Apr 25 02:37:14 149-210-165-102 sshd[12620]: input_userauth_request: invalid user neha Apr 25 02:37:14 149-210-165-102 sshd[12619]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:14 149-210-165-102 sshd[12619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:37:15 149-210-165-102 sshd[12617]: Failed password for root from 124.156.239.240 port 55888 ssh2 Apr 25 02:37:15 149-210-165-102 sshd[12618]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:37:16 149-210-165-102 sshd[12619]: Failed password for invalid user neha from 178.128.210.45 port 41418 ssh2 Apr 25 02:37:16 149-210-165-102 sshd[12620]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:37:23 149-210-165-102 sshd[12624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:37:25 149-210-165-102 sshd[12624]: Failed password for root from 199.195.252.236 port 37284 ssh2 Apr 25 02:37:25 149-210-165-102 sshd[12625]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:37:41 149-210-165-102 sshd[12634]: Invalid user admin from 170.106.100.61 Apr 25 02:37:41 149-210-165-102 sshd[12635]: input_userauth_request: invalid user admin Apr 25 02:37:41 149-210-165-102 sshd[12634]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:37:41 149-210-165-102 sshd[12634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:37:43 149-210-165-102 sshd[12634]: Failed password for invalid user admin from 170.106.100.61 port 36294 ssh2 Apr 25 02:37:43 149-210-165-102 sshd[12635]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:38:01 149-210-165-102 sshd[12643]: Invalid user vitiello from 42.192.118.249 Apr 25 02:38:01 149-210-165-102 sshd[12644]: input_userauth_request: invalid user vitiello Apr 25 02:38:01 149-210-165-102 sshd[12643]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:01 149-210-165-102 sshd[12643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:38:02 149-210-165-102 sshd[12643]: Failed password for invalid user vitiello from 42.192.118.249 port 43010 ssh2 Apr 25 02:38:03 149-210-165-102 sshd[12644]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:38:03 149-210-165-102 sshd[12650]: Invalid user linux from 152.136.122.126 Apr 25 02:38:03 149-210-165-102 sshd[12651]: input_userauth_request: invalid user linux Apr 25 02:38:03 149-210-165-102 sshd[12650]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:03 149-210-165-102 sshd[12650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:38:05 149-210-165-102 sshd[12650]: Failed password for invalid user linux from 152.136.122.126 port 17020 ssh2 Apr 25 02:38:05 149-210-165-102 sshd[12655]: Invalid user blog from 121.5.166.237 Apr 25 02:38:05 149-210-165-102 sshd[12656]: input_userauth_request: invalid user blog Apr 25 02:38:05 149-210-165-102 sshd[12655]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:05 149-210-165-102 sshd[12655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:38:05 149-210-165-102 sshd[12651]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:38:07 149-210-165-102 sshd[12655]: Failed password for invalid user blog from 121.5.166.237 port 33240 ssh2 Apr 25 02:38:07 149-210-165-102 sshd[12656]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:38:19 149-210-165-102 sshd[12665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 user=root Apr 25 02:38:21 149-210-165-102 sshd[12665]: Failed password for root from 180.76.134.229 port 38046 ssh2 Apr 25 02:38:21 149-210-165-102 sshd[12666]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:38:23 149-210-165-102 sshd[12669]: Invalid user postgres from 154.8.233.56 Apr 25 02:38:23 149-210-165-102 sshd[12671]: input_userauth_request: invalid user postgres Apr 25 02:38:23 149-210-165-102 sshd[12669]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:23 149-210-165-102 sshd[12669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:38:25 149-210-165-102 sshd[12669]: Failed password for invalid user postgres from 154.8.233.56 port 47064 ssh2 Apr 25 02:38:25 149-210-165-102 sshd[12671]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:38:36 149-210-165-102 sshd[12685]: Invalid user yangj from 42.193.54.22 Apr 25 02:38:36 149-210-165-102 sshd[12686]: input_userauth_request: invalid user yangj Apr 25 02:38:36 149-210-165-102 sshd[12685]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:36 149-210-165-102 sshd[12685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:38:37 149-210-165-102 sshd[12687]: Invalid user portia from 81.68.109.37 Apr 25 02:38:37 149-210-165-102 sshd[12688]: input_userauth_request: invalid user portia Apr 25 02:38:37 149-210-165-102 sshd[12687]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:37 149-210-165-102 sshd[12687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:38:38 149-210-165-102 sshd[12685]: Failed password for invalid user yangj from 42.193.54.22 port 54652 ssh2 Apr 25 02:38:38 149-210-165-102 sshd[12686]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:38:38 149-210-165-102 sshd[12689]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:38:38 149-210-165-102 sshd[12689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 user=root Apr 25 02:38:39 149-210-165-102 sshd[12687]: Failed password for invalid user portia from 81.68.109.37 port 41606 ssh2 Apr 25 02:38:40 149-210-165-102 sshd[12688]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:38:40 149-210-165-102 sshd[12689]: Failed password for root from 103.118.42.205 port 44744 ssh2 Apr 25 02:38:40 149-210-165-102 sshd[12690]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:38:44 149-210-165-102 sshd[12695]: Invalid user meng from 45.248.68.206 Apr 25 02:38:44 149-210-165-102 sshd[12696]: input_userauth_request: invalid user meng Apr 25 02:38:44 149-210-165-102 sshd[12695]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:44 149-210-165-102 sshd[12695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:38:46 149-210-165-102 sshd[12695]: Failed password for invalid user meng from 45.248.68.206 port 44932 ssh2 Apr 25 02:38:47 149-210-165-102 sshd[12694]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:38:47 149-210-165-102 sshd[12694]: Invalid user miller from 186.206.157.74 Apr 25 02:38:47 149-210-165-102 sshd[12698]: input_userauth_request: invalid user miller Apr 25 02:38:47 149-210-165-102 sshd[12694]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:47 149-210-165-102 sshd[12694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:38:47 149-210-165-102 sshd[12696]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:38:49 149-210-165-102 sshd[12694]: Failed password for invalid user miller from 186.206.157.74 port 60954 ssh2 Apr 25 02:38:49 149-210-165-102 sshd[12702]: Invalid user nfs from 170.106.100.61 Apr 25 02:38:49 149-210-165-102 sshd[12703]: input_userauth_request: invalid user nfs Apr 25 02:38:49 149-210-165-102 sshd[12702]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:49 149-210-165-102 sshd[12702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:38:49 149-210-165-102 sshd[12698]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:38:51 149-210-165-102 sshd[12702]: Failed password for invalid user nfs from 170.106.100.61 port 56082 ssh2 Apr 25 02:38:51 149-210-165-102 sshd[12703]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:38:58 149-210-165-102 sshd[12710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:38:58 149-210-165-102 sshd[12707]: Invalid user admin from 47.254.179.224 Apr 25 02:38:58 149-210-165-102 sshd[12708]: input_userauth_request: invalid user admin Apr 25 02:38:58 149-210-165-102 sshd[12707]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:38:58 149-210-165-102 sshd[12707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:39:00 149-210-165-102 sshd[12710]: Failed password for root from 119.28.61.47 port 47232 ssh2 Apr 25 02:39:00 149-210-165-102 sshd[12707]: Failed password for invalid user admin from 47.254.179.224 port 43960 ssh2 Apr 25 02:39:00 149-210-165-102 sshd[12708]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:39:00 149-210-165-102 sshd[12711]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:39:02 149-210-165-102 sshd[12713]: Invalid user army from 152.136.122.126 Apr 25 02:39:02 149-210-165-102 sshd[12714]: input_userauth_request: invalid user army Apr 25 02:39:02 149-210-165-102 sshd[12713]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:02 149-210-165-102 sshd[12713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:39:04 149-210-165-102 sshd[12713]: Failed password for invalid user army from 152.136.122.126 port 31536 ssh2 Apr 25 02:39:05 149-210-165-102 sshd[12714]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:39:13 149-210-165-102 sshd[12726]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:39:13 149-210-165-102 sshd[12726]: Invalid user gdk from 122.252.231.138 Apr 25 02:39:13 149-210-165-102 sshd[12727]: input_userauth_request: invalid user gdk Apr 25 02:39:13 149-210-165-102 sshd[12726]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:13 149-210-165-102 sshd[12726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:39:14 149-210-165-102 sshd[12728]: Invalid user trading from 140.143.230.41 Apr 25 02:39:14 149-210-165-102 sshd[12729]: input_userauth_request: invalid user trading Apr 25 02:39:14 149-210-165-102 sshd[12728]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:14 149-210-165-102 sshd[12728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:39:14 149-210-165-102 sshd[12730]: Invalid user jrojas from 199.195.252.236 Apr 25 02:39:14 149-210-165-102 sshd[12731]: input_userauth_request: invalid user jrojas Apr 25 02:39:14 149-210-165-102 sshd[12730]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:14 149-210-165-102 sshd[12730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:39:15 149-210-165-102 sshd[12726]: Failed password for invalid user gdk from 122.252.231.138 port 57274 ssh2 Apr 25 02:39:15 149-210-165-102 sshd[12727]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:39:16 149-210-165-102 sshd[12728]: Failed password for invalid user trading from 140.143.230.41 port 50026 ssh2 Apr 25 02:39:17 149-210-165-102 sshd[12730]: Failed password for invalid user jrojas from 199.195.252.236 port 42170 ssh2 Apr 25 02:39:17 149-210-165-102 sshd[12729]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:39:17 149-210-165-102 sshd[12731]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:39:17 149-210-165-102 sshd[12733]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:39:17 149-210-165-102 sshd[12733]: Invalid user pm from 186.210.115.15 Apr 25 02:39:17 149-210-165-102 sshd[12734]: input_userauth_request: invalid user pm Apr 25 02:39:17 149-210-165-102 sshd[12733]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:17 149-210-165-102 sshd[12733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:39:19 149-210-165-102 sshd[12733]: Failed password for invalid user pm from 186.210.115.15 port 45794 ssh2 Apr 25 02:39:19 149-210-165-102 sshd[12734]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:39:21 149-210-165-102 sshd[12743]: Invalid user jeff from 42.192.118.249 Apr 25 02:39:21 149-210-165-102 sshd[12744]: input_userauth_request: invalid user jeff Apr 25 02:39:21 149-210-165-102 sshd[12743]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:21 149-210-165-102 sshd[12743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:39:23 149-210-165-102 sshd[12743]: Failed password for invalid user jeff from 42.192.118.249 port 34276 ssh2 Apr 25 02:39:23 149-210-165-102 sshd[12744]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:39:28 149-210-165-102 sshd[12751]: Invalid user wol from 124.156.239.240 Apr 25 02:39:28 149-210-165-102 sshd[12752]: input_userauth_request: invalid user wol Apr 25 02:39:28 149-210-165-102 sshd[12751]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:28 149-210-165-102 sshd[12751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:39:30 149-210-165-102 sshd[12751]: Failed password for invalid user wol from 124.156.239.240 port 36632 ssh2 Apr 25 02:39:31 149-210-165-102 sshd[12752]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:39:41 149-210-165-102 sshd[12755]: Invalid user lord from 178.128.210.45 Apr 25 02:39:41 149-210-165-102 sshd[12756]: input_userauth_request: invalid user lord Apr 25 02:39:41 149-210-165-102 sshd[12755]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:41 149-210-165-102 sshd[12755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:39:43 149-210-165-102 sshd[12755]: Failed password for invalid user lord from 178.128.210.45 port 43242 ssh2 Apr 25 02:39:43 149-210-165-102 sshd[12756]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:39:46 149-210-165-102 sshd[12758]: Invalid user course from 129.146.140.161 Apr 25 02:39:46 149-210-165-102 sshd[12759]: input_userauth_request: invalid user course Apr 25 02:39:46 149-210-165-102 sshd[12758]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:46 149-210-165-102 sshd[12758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:39:47 149-210-165-102 sshd[12758]: Failed password for invalid user course from 129.146.140.161 port 45934 ssh2 Apr 25 02:39:48 149-210-165-102 sshd[12759]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:39:56 149-210-165-102 sshd[12772]: Invalid user malik from 170.106.100.61 Apr 25 02:39:56 149-210-165-102 sshd[12773]: input_userauth_request: invalid user malik Apr 25 02:39:56 149-210-165-102 sshd[12772]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:56 149-210-165-102 sshd[12772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:39:57 149-210-165-102 sshd[12770]: Invalid user my from 121.5.23.61 Apr 25 02:39:57 149-210-165-102 sshd[12771]: input_userauth_request: invalid user my Apr 25 02:39:57 149-210-165-102 sshd[12770]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:39:57 149-210-165-102 sshd[12770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 02:39:58 149-210-165-102 sshd[12772]: Failed password for invalid user malik from 170.106.100.61 port 47626 ssh2 Apr 25 02:39:58 149-210-165-102 sshd[12773]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:39:59 149-210-165-102 sshd[12770]: Failed password for invalid user my from 121.5.23.61 port 57798 ssh2 Apr 25 02:40:00 149-210-165-102 sshd[12771]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:40:05 149-210-165-102 sshd[12775]: Invalid user usuario from 152.136.122.126 Apr 25 02:40:05 149-210-165-102 sshd[12776]: input_userauth_request: invalid user usuario Apr 25 02:40:05 149-210-165-102 sshd[12775]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:05 149-210-165-102 sshd[12775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:40:06 149-210-165-102 sshd[12775]: Failed password for invalid user usuario from 152.136.122.126 port 46048 ssh2 Apr 25 02:40:10 149-210-165-102 sshd[12776]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:40:12 149-210-165-102 sshd[12801]: Invalid user tiago from 42.193.54.22 Apr 25 02:40:12 149-210-165-102 sshd[12802]: input_userauth_request: invalid user tiago Apr 25 02:40:12 149-210-165-102 sshd[12801]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:12 149-210-165-102 sshd[12801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:40:14 149-210-165-102 sshd[12801]: Failed password for invalid user tiago from 42.193.54.22 port 50824 ssh2 Apr 25 02:40:14 149-210-165-102 sshd[12802]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:40:21 149-210-165-102 sshd[12805]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:40:21 149-210-165-102 sshd[12805]: Invalid user um from 186.206.157.74 Apr 25 02:40:21 149-210-165-102 sshd[12806]: input_userauth_request: invalid user um Apr 25 02:40:21 149-210-165-102 sshd[12805]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:21 149-210-165-102 sshd[12805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:40:23 149-210-165-102 sshd[12805]: Failed password for invalid user um from 186.206.157.74 port 49375 ssh2 Apr 25 02:40:23 149-210-165-102 sshd[12806]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:40:30 149-210-165-102 sshd[12814]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:40:30 149-210-165-102 sshd[12814]: Invalid user ui from 177.134.160.29 Apr 25 02:40:30 149-210-165-102 sshd[12815]: input_userauth_request: invalid user ui Apr 25 02:40:30 149-210-165-102 sshd[12814]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:30 149-210-165-102 sshd[12814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:40:32 149-210-165-102 sshd[12814]: Failed password for invalid user ui from 177.134.160.29 port 39466 ssh2 Apr 25 02:40:32 149-210-165-102 sshd[12815]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:40:34 149-210-165-102 sshd[12813]: Did not receive identification string from 111.7.96.160 Apr 25 02:40:35 149-210-165-102 sshd[12811]: Invalid user dasusr1 from 150.109.252.206 Apr 25 02:40:35 149-210-165-102 sshd[12812]: input_userauth_request: invalid user dasusr1 Apr 25 02:40:35 149-210-165-102 sshd[12811]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:35 149-210-165-102 sshd[12811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:40:36 149-210-165-102 sshd[12817]: Invalid user postgres from 180.76.134.229 Apr 25 02:40:36 149-210-165-102 sshd[12819]: input_userauth_request: invalid user postgres Apr 25 02:40:36 149-210-165-102 sshd[12817]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:36 149-210-165-102 sshd[12817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:40:37 149-210-165-102 sshd[12811]: Failed password for invalid user dasusr1 from 150.109.252.206 port 53532 ssh2 Apr 25 02:40:37 149-210-165-102 sshd[12812]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:40:38 149-210-165-102 sshd[12817]: Failed password for invalid user postgres from 180.76.134.229 port 42684 ssh2 Apr 25 02:40:38 149-210-165-102 sshd[12819]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:40:39 149-210-165-102 sshd[12822]: Invalid user lt from 42.192.118.249 Apr 25 02:40:39 149-210-165-102 sshd[12823]: input_userauth_request: invalid user lt Apr 25 02:40:39 149-210-165-102 sshd[12822]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:39 149-210-165-102 sshd[12822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:40:41 149-210-165-102 sshd[12822]: Failed password for invalid user lt from 42.192.118.249 port 53776 ssh2 Apr 25 02:40:41 149-210-165-102 sshd[12823]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:40:43 149-210-165-102 sshd[12828]: Invalid user admin from 121.4.71.96 Apr 25 02:40:43 149-210-165-102 sshd[12830]: input_userauth_request: invalid user admin Apr 25 02:40:43 149-210-165-102 sshd[12828]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:43 149-210-165-102 sshd[12828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:40:44 149-210-165-102 sshd[12828]: Failed password for invalid user admin from 121.4.71.96 port 47276 ssh2 Apr 25 02:40:45 149-210-165-102 sshd[12830]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:40:48 149-210-165-102 sshd[12836]: Invalid user document from 154.8.233.56 Apr 25 02:40:48 149-210-165-102 sshd[12837]: input_userauth_request: invalid user document Apr 25 02:40:48 149-210-165-102 sshd[12836]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:40:48 149-210-165-102 sshd[12836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:40:50 149-210-165-102 sshd[12836]: Failed password for invalid user document from 154.8.233.56 port 48596 ssh2 Apr 25 02:40:50 149-210-165-102 sshd[12837]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:40:54 149-210-165-102 sshd[12843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:40:56 149-210-165-102 sshd[12843]: Failed password for root from 45.248.68.206 port 43364 ssh2 Apr 25 02:40:56 149-210-165-102 sshd[12844]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:40:58 149-210-165-102 sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 02:41:00 149-210-165-102 sshd[12852]: Invalid user leticia from 199.195.252.236 Apr 25 02:41:00 149-210-165-102 sshd[12853]: input_userauth_request: invalid user leticia Apr 25 02:41:00 149-210-165-102 sshd[12852]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:00 149-210-165-102 sshd[12852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:41:00 149-210-165-102 sshd[12847]: Failed password for root from 152.136.122.126 port 60560 ssh2 Apr 25 02:41:01 149-210-165-102 sshd[12848]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:41:02 149-210-165-102 sshd[12855]: Invalid user ck from 170.106.100.61 Apr 25 02:41:02 149-210-165-102 sshd[12856]: input_userauth_request: invalid user ck Apr 25 02:41:02 149-210-165-102 sshd[12855]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:02 149-210-165-102 sshd[12855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:41:02 149-210-165-102 sshd[12852]: Failed password for invalid user leticia from 199.195.252.236 port 47052 ssh2 Apr 25 02:41:02 149-210-165-102 sshd[12853]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:41:04 149-210-165-102 sshd[12855]: Failed password for invalid user ck from 170.106.100.61 port 39172 ssh2 Apr 25 02:41:04 149-210-165-102 sshd[12856]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:41:22 149-210-165-102 sshd[12871]: fatal: no matching cipher found: client chacha20-poly1305@openssh.com server aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se Apr 25 02:41:23 149-210-165-102 sshd[12867]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:41:23 149-210-165-102 sshd[12867]: Invalid user Joey from 186.210.115.15 Apr 25 02:41:23 149-210-165-102 sshd[12870]: input_userauth_request: invalid user Joey Apr 25 02:41:23 149-210-165-102 sshd[12867]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:23 149-210-165-102 sshd[12867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:41:25 149-210-165-102 sshd[12867]: Failed password for invalid user Joey from 186.210.115.15 port 48308 ssh2 Apr 25 02:41:25 149-210-165-102 sshd[12870]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:41:32 149-210-165-102 sshd[12880]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:41:32 149-210-165-102 sshd[12880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 user=root Apr 25 02:41:32 149-210-165-102 sshd[12878]: Invalid user cedric from 121.5.166.237 Apr 25 02:41:32 149-210-165-102 sshd[12879]: input_userauth_request: invalid user cedric Apr 25 02:41:32 149-210-165-102 sshd[12878]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:32 149-210-165-102 sshd[12878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:41:34 149-210-165-102 sshd[12880]: Failed password for root from 103.118.42.205 port 36534 ssh2 Apr 25 02:41:34 149-210-165-102 sshd[12878]: Failed password for invalid user cedric from 121.5.166.237 port 41346 ssh2 Apr 25 02:41:34 149-210-165-102 sshd[12881]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:41:35 149-210-165-102 sshd[12879]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:41:43 149-210-165-102 sshd[12888]: Invalid user arnav from 42.193.54.22 Apr 25 02:41:43 149-210-165-102 sshd[12889]: input_userauth_request: invalid user arnav Apr 25 02:41:43 149-210-165-102 sshd[12888]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:43 149-210-165-102 sshd[12888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:41:43 149-210-165-102 sshd[12891]: Invalid user elasticsearch from 124.156.239.240 Apr 25 02:41:43 149-210-165-102 sshd[12892]: input_userauth_request: invalid user elasticsearch Apr 25 02:41:43 149-210-165-102 sshd[12891]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:43 149-210-165-102 sshd[12891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:41:45 149-210-165-102 sshd[12888]: Failed password for invalid user arnav from 42.193.54.22 port 46966 ssh2 Apr 25 02:41:45 149-210-165-102 sshd[12889]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:41:45 149-210-165-102 sshd[12891]: Failed password for invalid user elasticsearch from 124.156.239.240 port 45588 ssh2 Apr 25 02:41:46 149-210-165-102 sshd[12892]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:41:52 149-210-165-102 sshd[12902]: Invalid user test from 42.192.118.249 Apr 25 02:41:52 149-210-165-102 sshd[12903]: input_userauth_request: invalid user test Apr 25 02:41:52 149-210-165-102 sshd[12902]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:52 149-210-165-102 sshd[12902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:41:53 149-210-165-102 sshd[12906]: Invalid user test1 from 152.136.122.126 Apr 25 02:41:53 149-210-165-102 sshd[12907]: input_userauth_request: invalid user test1 Apr 25 02:41:53 149-210-165-102 sshd[12906]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:53 149-210-165-102 sshd[12906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:41:55 149-210-165-102 sshd[12904]: Invalid user web from 47.254.179.224 Apr 25 02:41:55 149-210-165-102 sshd[12905]: input_userauth_request: invalid user web Apr 25 02:41:55 149-210-165-102 sshd[12904]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:55 149-210-165-102 sshd[12904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:41:55 149-210-165-102 sshd[12906]: Failed password for invalid user test1 from 152.136.122.126 port 11090 ssh2 Apr 25 02:41:55 149-210-165-102 sshd[12902]: Failed password for invalid user test from 42.192.118.249 port 45040 ssh2 Apr 25 02:41:55 149-210-165-102 sshd[12903]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:41:57 149-210-165-102 sshd[12907]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:41:57 149-210-165-102 sshd[12904]: Failed password for invalid user web from 47.254.179.224 port 54860 ssh2 Apr 25 02:41:57 149-210-165-102 sshd[12905]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:41:57 149-210-165-102 sshd[12909]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:41:57 149-210-165-102 sshd[12909]: Invalid user hector from 186.206.157.74 Apr 25 02:41:57 149-210-165-102 sshd[12910]: input_userauth_request: invalid user hector Apr 25 02:41:57 149-210-165-102 sshd[12909]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:41:57 149-210-165-102 sshd[12909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:42:00 149-210-165-102 sshd[12909]: Failed password for invalid user hector from 186.206.157.74 port 31629 ssh2 Apr 25 02:42:00 149-210-165-102 sshd[12910]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:42:08 149-210-165-102 sshd[12920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:42:09 149-210-165-102 sshd[12922]: Invalid user juris from 170.106.100.61 Apr 25 02:42:09 149-210-165-102 sshd[12923]: input_userauth_request: invalid user juris Apr 25 02:42:09 149-210-165-102 sshd[12922]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:09 149-210-165-102 sshd[12922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:42:09 149-210-165-102 sshd[12916]: Invalid user yangj from 178.128.210.45 Apr 25 02:42:09 149-210-165-102 sshd[12918]: input_userauth_request: invalid user yangj Apr 25 02:42:09 149-210-165-102 sshd[12916]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:09 149-210-165-102 sshd[12916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:42:10 149-210-165-102 sshd[12920]: Failed password for root from 119.28.61.47 port 43898 ssh2 Apr 25 02:42:10 149-210-165-102 sshd[12921]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:42:11 149-210-165-102 sshd[12922]: Failed password for invalid user juris from 170.106.100.61 port 58954 ssh2 Apr 25 02:42:11 149-210-165-102 sshd[12923]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:42:12 149-210-165-102 sshd[12916]: Failed password for invalid user yangj from 178.128.210.45 port 45066 ssh2 Apr 25 02:42:12 149-210-165-102 sshd[12918]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:42:32 149-210-165-102 sshd[12937]: Invalid user milton from 121.4.71.96 Apr 25 02:42:32 149-210-165-102 sshd[12938]: input_userauth_request: invalid user milton Apr 25 02:42:32 149-210-165-102 sshd[12937]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:32 149-210-165-102 sshd[12937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:42:35 149-210-165-102 sshd[12937]: Failed password for invalid user milton from 121.4.71.96 port 41558 ssh2 Apr 25 02:42:35 149-210-165-102 sshd[12938]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:42:45 149-210-165-102 sshd[12943]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:42:45 149-210-165-102 sshd[12943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 user=root Apr 25 02:42:46 149-210-165-102 sshd[12947]: Invalid user emil from 199.195.252.236 Apr 25 02:42:46 149-210-165-102 sshd[12948]: input_userauth_request: invalid user emil Apr 25 02:42:46 149-210-165-102 sshd[12947]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:46 149-210-165-102 sshd[12947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:42:48 149-210-165-102 sshd[12943]: Failed password for root from 122.252.231.138 port 56078 ssh2 Apr 25 02:42:48 149-210-165-102 sshd[12944]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:42:48 149-210-165-102 sshd[12950]: Invalid user shyh from 152.136.122.126 Apr 25 02:42:48 149-210-165-102 sshd[12951]: input_userauth_request: invalid user shyh Apr 25 02:42:48 149-210-165-102 sshd[12950]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:48 149-210-165-102 sshd[12950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:42:49 149-210-165-102 sshd[12947]: Failed password for invalid user emil from 199.195.252.236 port 51934 ssh2 Apr 25 02:42:49 149-210-165-102 sshd[12948]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:42:49 149-210-165-102 sshd[12949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 user=mysql Apr 25 02:42:50 149-210-165-102 sshd[12950]: Failed password for invalid user shyh from 152.136.122.126 port 25594 ssh2 Apr 25 02:42:50 149-210-165-102 sshd[12951]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:42:51 149-210-165-102 sshd[12953]: Invalid user csgoserver from 140.143.230.41 Apr 25 02:42:51 149-210-165-102 sshd[12954]: input_userauth_request: invalid user csgoserver Apr 25 02:42:51 149-210-165-102 sshd[12953]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:42:51 149-210-165-102 sshd[12953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:42:51 149-210-165-102 sshd[12949]: Failed password for mysql from 180.76.134.229 port 47330 ssh2 Apr 25 02:42:52 149-210-165-102 sshd[12952]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:42:53 149-210-165-102 sshd[12953]: Failed password for invalid user csgoserver from 140.143.230.41 port 60762 ssh2 Apr 25 02:42:53 149-210-165-102 sshd[12954]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:43:08 149-210-165-102 sshd[12972]: Invalid user user5 from 42.192.118.249 Apr 25 02:43:08 149-210-165-102 sshd[12973]: input_userauth_request: invalid user user5 Apr 25 02:43:08 149-210-165-102 sshd[12972]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:08 149-210-165-102 sshd[12972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:43:10 149-210-165-102 sshd[12976]: Invalid user kristofer from 45.248.68.206 Apr 25 02:43:10 149-210-165-102 sshd[12977]: input_userauth_request: invalid user kristofer Apr 25 02:43:10 149-210-165-102 sshd[12976]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:10 149-210-165-102 sshd[12976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:43:10 149-210-165-102 sshd[12972]: Failed password for invalid user user5 from 42.192.118.249 port 36300 ssh2 Apr 25 02:43:11 149-210-165-102 sshd[12973]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:43:12 149-210-165-102 sshd[12979]: Invalid user shop from 154.8.233.56 Apr 25 02:43:12 149-210-165-102 sshd[12980]: input_userauth_request: invalid user shop Apr 25 02:43:12 149-210-165-102 sshd[12979]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:12 149-210-165-102 sshd[12979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:43:13 149-210-165-102 sshd[12976]: Failed password for invalid user kristofer from 45.248.68.206 port 41794 ssh2 Apr 25 02:43:13 149-210-165-102 sshd[12981]: Invalid user test from 42.193.54.22 Apr 25 02:43:13 149-210-165-102 sshd[12982]: input_userauth_request: invalid user test Apr 25 02:43:13 149-210-165-102 sshd[12981]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:13 149-210-165-102 sshd[12981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:43:14 149-210-165-102 sshd[12977]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:43:14 149-210-165-102 sshd[12979]: Failed password for invalid user shop from 154.8.233.56 port 50128 ssh2 Apr 25 02:43:14 149-210-165-102 sshd[12980]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:43:15 149-210-165-102 sshd[12981]: Failed password for invalid user test from 42.193.54.22 port 43120 ssh2 Apr 25 02:43:15 149-210-165-102 sshd[12982]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:43:16 149-210-165-102 sshd[12983]: Invalid user marcos from 170.106.100.61 Apr 25 02:43:16 149-210-165-102 sshd[12985]: input_userauth_request: invalid user marcos Apr 25 02:43:16 149-210-165-102 sshd[12983]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:16 149-210-165-102 sshd[12983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:43:18 149-210-165-102 sshd[12983]: Failed password for invalid user marcos from 170.106.100.61 port 50502 ssh2 Apr 25 02:43:18 149-210-165-102 sshd[12985]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:43:19 149-210-165-102 sshd[12986]: Invalid user augusto from 121.5.23.61 Apr 25 02:43:19 149-210-165-102 sshd[12987]: input_userauth_request: invalid user augusto Apr 25 02:43:19 149-210-165-102 sshd[12986]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:19 149-210-165-102 sshd[12986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 02:43:22 149-210-165-102 sshd[12986]: Failed password for invalid user augusto from 121.5.23.61 port 38554 ssh2 Apr 25 02:43:22 149-210-165-102 sshd[12987]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:43:29 149-210-165-102 sshd[12994]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:43:29 149-210-165-102 sshd[12994]: Invalid user a from 186.210.115.15 Apr 25 02:43:29 149-210-165-102 sshd[12995]: input_userauth_request: invalid user a Apr 25 02:43:29 149-210-165-102 sshd[12994]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:29 149-210-165-102 sshd[12994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:43:30 149-210-165-102 sshd[12994]: Failed password for invalid user a from 186.210.115.15 port 50824 ssh2 Apr 25 02:43:30 149-210-165-102 sshd[12995]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:43:32 149-210-165-102 sshd[12996]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:43:32 149-210-165-102 sshd[12996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:43:34 149-210-165-102 sshd[12996]: Failed password for root from 186.206.157.74 port 50624 ssh2 Apr 25 02:43:34 149-210-165-102 sshd[12997]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:43:41 149-210-165-102 sshd[13008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 02:43:43 149-210-165-102 sshd[13008]: Failed password for root from 152.136.122.126 port 40094 ssh2 Apr 25 02:43:43 149-210-165-102 sshd[13009]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:43:50 149-210-165-102 sshd[13015]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:43:50 149-210-165-102 sshd[13015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 user=root Apr 25 02:43:52 149-210-165-102 sshd[13015]: Failed password for root from 103.118.42.205 port 54544 ssh2 Apr 25 02:43:53 149-210-165-102 sshd[13016]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:43:55 149-210-165-102 sshd[13020]: Invalid user fourjs from 124.156.239.240 Apr 25 02:43:55 149-210-165-102 sshd[13022]: input_userauth_request: invalid user fourjs Apr 25 02:43:55 149-210-165-102 sshd[13020]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:43:55 149-210-165-102 sshd[13020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:43:58 149-210-165-102 sshd[13020]: Failed password for invalid user fourjs from 124.156.239.240 port 54550 ssh2 Apr 25 02:43:58 149-210-165-102 sshd[13022]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:44:07 149-210-165-102 sshd[13026]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:44:07 149-210-165-102 sshd[13026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 user=root Apr 25 02:44:09 149-210-165-102 sshd[13026]: Failed password for root from 177.134.160.29 port 58965 ssh2 Apr 25 02:44:09 149-210-165-102 sshd[13027]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:44:24 149-210-165-102 sshd[13042]: Invalid user polis from 42.192.118.249 Apr 25 02:44:24 149-210-165-102 sshd[13043]: input_userauth_request: invalid user polis Apr 25 02:44:24 149-210-165-102 sshd[13042]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:24 149-210-165-102 sshd[13042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:44:26 149-210-165-102 sshd[13042]: Failed password for invalid user polis from 42.192.118.249 port 55806 ssh2 Apr 25 02:44:26 149-210-165-102 sshd[13043]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:44:27 149-210-165-102 sshd[13046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 user=root Apr 25 02:44:27 149-210-165-102 sshd[13044]: Invalid user cyrus from 178.128.210.45 Apr 25 02:44:27 149-210-165-102 sshd[13045]: input_userauth_request: invalid user cyrus Apr 25 02:44:27 149-210-165-102 sshd[13044]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:27 149-210-165-102 sshd[13044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:44:27 149-210-165-102 sshd[13048]: Invalid user print from 170.106.100.61 Apr 25 02:44:27 149-210-165-102 sshd[13049]: input_userauth_request: invalid user print Apr 25 02:44:27 149-210-165-102 sshd[13048]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:27 149-210-165-102 sshd[13048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:44:29 149-210-165-102 sshd[13046]: Failed password for root from 121.4.71.96 port 35856 ssh2 Apr 25 02:44:29 149-210-165-102 sshd[13044]: Failed password for invalid user cyrus from 178.128.210.45 port 46890 ssh2 Apr 25 02:44:29 149-210-165-102 sshd[13048]: Failed password for invalid user print from 170.106.100.61 port 42050 ssh2 Apr 25 02:44:29 149-210-165-102 sshd[13045]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:44:29 149-210-165-102 sshd[13049]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:44:29 149-210-165-102 sshd[13047]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:44:37 149-210-165-102 sshd[13069]: Invalid user carter from 152.136.122.126 Apr 25 02:44:37 149-210-165-102 sshd[13071]: input_userauth_request: invalid user carter Apr 25 02:44:37 149-210-165-102 sshd[13069]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:37 149-210-165-102 sshd[13069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:44:37 149-210-165-102 sshd[13072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:44:39 149-210-165-102 sshd[13069]: Failed password for invalid user carter from 152.136.122.126 port 54606 ssh2 Apr 25 02:44:39 149-210-165-102 sshd[13072]: Failed password for root from 199.195.252.236 port 56816 ssh2 Apr 25 02:44:39 149-210-165-102 sshd[13071]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:44:39 149-210-165-102 sshd[13073]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:44:40 149-210-165-102 sshd[13061]: Invalid user oraprod from 150.109.252.206 Apr 25 02:44:40 149-210-165-102 sshd[13065]: input_userauth_request: invalid user oraprod Apr 25 02:44:40 149-210-165-102 sshd[13061]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:40 149-210-165-102 sshd[13061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:44:43 149-210-165-102 sshd[13061]: Failed password for invalid user oraprod from 150.109.252.206 port 55580 ssh2 Apr 25 02:44:43 149-210-165-102 sshd[13038]: Connection closed by 81.68.109.37 Apr 25 02:44:43 149-210-165-102 sshd[13065]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:44:45 149-210-165-102 sshd[13077]: Invalid user polkitd from 42.193.54.22 Apr 25 02:44:45 149-210-165-102 sshd[13078]: input_userauth_request: invalid user polkitd Apr 25 02:44:45 149-210-165-102 sshd[13077]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:45 149-210-165-102 sshd[13077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:44:48 149-210-165-102 sshd[13077]: Failed password for invalid user polkitd from 42.193.54.22 port 39272 ssh2 Apr 25 02:44:48 149-210-165-102 sshd[13078]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:44:52 149-210-165-102 sshd[13080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=root Apr 25 02:44:55 149-210-165-102 sshd[13080]: Failed password for root from 47.254.179.224 port 37516 ssh2 Apr 25 02:44:55 149-210-165-102 sshd[13081]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:44:58 149-210-165-102 sshd[13086]: Invalid user dis from 121.5.166.237 Apr 25 02:44:58 149-210-165-102 sshd[13087]: input_userauth_request: invalid user dis Apr 25 02:44:58 149-210-165-102 sshd[13086]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:44:58 149-210-165-102 sshd[13086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:44:59 149-210-165-102 sshd[13086]: Failed password for invalid user dis from 121.5.166.237 port 49448 ssh2 Apr 25 02:45:00 149-210-165-102 sshd[13087]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:45:04 149-210-165-102 sshd[13094]: Invalid user developer from 180.76.134.229 Apr 25 02:45:04 149-210-165-102 sshd[13096]: input_userauth_request: invalid user developer Apr 25 02:45:04 149-210-165-102 sshd[13094]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:04 149-210-165-102 sshd[13094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:45:07 149-210-165-102 sshd[13094]: Failed password for invalid user developer from 180.76.134.229 port 51958 ssh2 Apr 25 02:45:07 149-210-165-102 sshd[13096]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:45:12 149-210-165-102 sshd[13098]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:45:12 149-210-165-102 sshd[13098]: Invalid user herry from 186.206.157.74 Apr 25 02:45:12 149-210-165-102 sshd[13100]: input_userauth_request: invalid user herry Apr 25 02:45:12 149-210-165-102 sshd[13098]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:12 149-210-165-102 sshd[13098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:45:13 149-210-165-102 sshd[13098]: Failed password for invalid user herry from 186.206.157.74 port 25677 ssh2 Apr 25 02:45:14 149-210-165-102 sshd[13100]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:45:15 149-210-165-102 sshd[13103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:45:18 149-210-165-102 sshd[13103]: Failed password for root from 45.248.68.206 port 40226 ssh2 Apr 25 02:45:19 149-210-165-102 sshd[13104]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:45:23 149-210-165-102 sshd[13106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 user=root Apr 25 02:45:24 149-210-165-102 sshd[13106]: Failed password for root from 119.28.61.47 port 40570 ssh2 Apr 25 02:45:25 149-210-165-102 sshd[13108]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:45:32 149-210-165-102 sshd[13112]: Invalid user jair from 154.8.233.56 Apr 25 02:45:32 149-210-165-102 sshd[13113]: input_userauth_request: invalid user jair Apr 25 02:45:32 149-210-165-102 sshd[13112]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:32 149-210-165-102 sshd[13112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:45:34 149-210-165-102 sshd[13112]: Failed password for invalid user jair from 154.8.233.56 port 51658 ssh2 Apr 25 02:45:34 149-210-165-102 sshd[13113]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:45:38 149-210-165-102 sshd[13125]: Invalid user compta from 152.136.122.126 Apr 25 02:45:38 149-210-165-102 sshd[13126]: input_userauth_request: invalid user compta Apr 25 02:45:38 149-210-165-102 sshd[13125]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:38 149-210-165-102 sshd[13125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:45:38 149-210-165-102 sshd[13127]: Invalid user kevin from 170.106.100.61 Apr 25 02:45:38 149-210-165-102 sshd[13128]: input_userauth_request: invalid user kevin Apr 25 02:45:38 149-210-165-102 sshd[13127]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:38 149-210-165-102 sshd[13127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:45:40 149-210-165-102 sshd[13125]: Failed password for invalid user compta from 152.136.122.126 port 5150 ssh2 Apr 25 02:45:40 149-210-165-102 sshd[13130]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:45:40 149-210-165-102 sshd[13130]: Invalid user db2inst1 from 186.210.115.15 Apr 25 02:45:40 149-210-165-102 sshd[13133]: input_userauth_request: invalid user db2inst1 Apr 25 02:45:40 149-210-165-102 sshd[13130]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:40 149-210-165-102 sshd[13130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:45:40 149-210-165-102 sshd[13126]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:45:40 149-210-165-102 sshd[13127]: Failed password for invalid user kevin from 170.106.100.61 port 33606 ssh2 Apr 25 02:45:41 149-210-165-102 sshd[13128]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:45:43 149-210-165-102 sshd[13130]: Failed password for invalid user db2inst1 from 186.210.115.15 port 53332 ssh2 Apr 25 02:45:43 149-210-165-102 sshd[13133]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:45:46 149-210-165-102 sshd[13129]: Invalid user maria from 129.146.140.161 Apr 25 02:45:46 149-210-165-102 sshd[13131]: input_userauth_request: invalid user maria Apr 25 02:45:46 149-210-165-102 sshd[13129]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:45:46 149-210-165-102 sshd[13129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:45:48 149-210-165-102 sshd[13134]: Connection closed by 42.192.118.249 Apr 25 02:45:48 149-210-165-102 sshd[13129]: Failed password for invalid user maria from 129.146.140.161 port 57316 ssh2 Apr 25 02:45:48 149-210-165-102 sshd[13131]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:46:05 149-210-165-102 sshd[13148]: Invalid user praful from 124.156.239.240 Apr 25 02:46:05 149-210-165-102 sshd[13149]: input_userauth_request: invalid user praful Apr 25 02:46:05 149-210-165-102 sshd[13148]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:05 149-210-165-102 sshd[13148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:46:07 149-210-165-102 sshd[13148]: Failed password for invalid user praful from 124.156.239.240 port 35276 ssh2 Apr 25 02:46:07 149-210-165-102 sshd[13149]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:46:09 149-210-165-102 sshd[13152]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:46:09 149-210-165-102 sshd[13152]: Invalid user test from 103.118.42.205 Apr 25 02:46:09 149-210-165-102 sshd[13153]: input_userauth_request: invalid user test Apr 25 02:46:09 149-210-165-102 sshd[13152]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:09 149-210-165-102 sshd[13152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:46:11 149-210-165-102 sshd[13152]: Failed password for invalid user test from 103.118.42.205 port 44382 ssh2 Apr 25 02:46:11 149-210-165-102 sshd[13153]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:46:17 149-210-165-102 sshd[13161]: Invalid user omega from 42.193.54.22 Apr 25 02:46:17 149-210-165-102 sshd[13163]: input_userauth_request: invalid user omega Apr 25 02:46:17 149-210-165-102 sshd[13161]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:17 149-210-165-102 sshd[13161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:46:19 149-210-165-102 sshd[13161]: Failed password for invalid user omega from 42.193.54.22 port 35424 ssh2 Apr 25 02:46:19 149-210-165-102 sshd[13163]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:46:20 149-210-165-102 sshd[13166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 user=root Apr 25 02:46:22 149-210-165-102 sshd[13166]: Failed password for root from 121.4.71.96 port 58366 ssh2 Apr 25 02:46:23 149-210-165-102 sshd[13167]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:46:27 149-210-165-102 sshd[13174]: Invalid user cups from 140.143.230.41 Apr 25 02:46:27 149-210-165-102 sshd[13176]: input_userauth_request: invalid user cups Apr 25 02:46:27 149-210-165-102 sshd[13174]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:27 149-210-165-102 sshd[13174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:46:27 149-210-165-102 sshd[13181]: Invalid user sami from 199.195.252.236 Apr 25 02:46:27 149-210-165-102 sshd[13182]: input_userauth_request: invalid user sami Apr 25 02:46:27 149-210-165-102 sshd[13181]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:27 149-210-165-102 sshd[13181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:46:28 149-210-165-102 sshd[13174]: Failed password for invalid user cups from 140.143.230.41 port 43254 ssh2 Apr 25 02:46:29 149-210-165-102 sshd[13176]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:46:29 149-210-165-102 sshd[13181]: Failed password for invalid user sami from 199.195.252.236 port 33468 ssh2 Apr 25 02:46:29 149-210-165-102 sshd[13182]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:46:39 149-210-165-102 sshd[13209]: Invalid user hadoop from 152.136.122.126 Apr 25 02:46:39 149-210-165-102 sshd[13211]: input_userauth_request: invalid user hadoop Apr 25 02:46:39 149-210-165-102 sshd[13209]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:39 149-210-165-102 sshd[13209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:46:41 149-210-165-102 sshd[13209]: Failed password for invalid user hadoop from 152.136.122.126 port 19672 ssh2 Apr 25 02:46:42 149-210-165-102 sshd[13211]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:46:43 149-210-165-102 sshd[13223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 user=ftp Apr 25 02:46:45 149-210-165-102 sshd[13223]: Failed password for ftp from 178.128.210.45 port 48716 ssh2 Apr 25 02:46:45 149-210-165-102 sshd[13224]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:46:48 149-210-165-102 sshd[13237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 user=root Apr 25 02:46:50 149-210-165-102 sshd[13237]: Failed password for root from 170.106.100.61 port 53386 ssh2 Apr 25 02:46:50 149-210-165-102 sshd[13238]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:46:52 149-210-165-102 sshd[13244]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:46:52 149-210-165-102 sshd[13244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:46:54 149-210-165-102 sshd[13244]: Failed password for root from 186.206.157.74 port 52937 ssh2 Apr 25 02:46:55 149-210-165-102 sshd[13246]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:46:56 149-210-165-102 sshd[13256]: Invalid user mohamed from 42.192.118.249 Apr 25 02:46:56 149-210-165-102 sshd[13259]: input_userauth_request: invalid user mohamed Apr 25 02:46:56 149-210-165-102 sshd[13256]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:46:56 149-210-165-102 sshd[13256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:46:58 149-210-165-102 sshd[13256]: Failed password for invalid user mohamed from 42.192.118.249 port 38340 ssh2 Apr 25 02:46:58 149-210-165-102 sshd[13259]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:47:27 149-210-165-102 sshd[13356]: Invalid user admin from 180.76.134.229 Apr 25 02:47:27 149-210-165-102 sshd[13357]: input_userauth_request: invalid user admin Apr 25 02:47:27 149-210-165-102 sshd[13356]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:27 149-210-165-102 sshd[13356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:47:27 149-210-165-102 sshd[13365]: Invalid user shania from 45.248.68.206 Apr 25 02:47:27 149-210-165-102 sshd[13367]: input_userauth_request: invalid user shania Apr 25 02:47:27 149-210-165-102 sshd[13365]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:27 149-210-165-102 sshd[13365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:47:29 149-210-165-102 sshd[13356]: Failed password for invalid user admin from 180.76.134.229 port 56596 ssh2 Apr 25 02:47:29 149-210-165-102 sshd[13357]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:47:29 149-210-165-102 sshd[13365]: Failed password for invalid user shania from 45.248.68.206 port 38658 ssh2 Apr 25 02:47:30 149-210-165-102 sshd[13367]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:47:40 149-210-165-102 sshd[13397]: Invalid user cao from 152.136.122.126 Apr 25 02:47:40 149-210-165-102 sshd[13399]: input_userauth_request: invalid user cao Apr 25 02:47:40 149-210-165-102 sshd[13397]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:40 149-210-165-102 sshd[13397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:47:41 149-210-165-102 sshd[13405]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:47:41 149-210-165-102 sshd[13405]: Invalid user musikbot from 177.134.160.29 Apr 25 02:47:41 149-210-165-102 sshd[13407]: input_userauth_request: invalid user musikbot Apr 25 02:47:41 149-210-165-102 sshd[13405]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:41 149-210-165-102 sshd[13405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:47:42 149-210-165-102 sshd[13397]: Failed password for invalid user cao from 152.136.122.126 port 34200 ssh2 Apr 25 02:47:42 149-210-165-102 sshd[13399]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:47:43 149-210-165-102 sshd[13405]: Failed password for invalid user musikbot from 177.134.160.29 port 50258 ssh2 Apr 25 02:47:43 149-210-165-102 sshd[13407]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:47:52 149-210-165-102 sshd[13430]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:47:52 149-210-165-102 sshd[13430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:47:52 149-210-165-102 sshd[13433]: Invalid user alfred from 154.8.233.56 Apr 25 02:47:52 149-210-165-102 sshd[13435]: input_userauth_request: invalid user alfred Apr 25 02:47:52 149-210-165-102 sshd[13433]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:52 149-210-165-102 sshd[13433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:47:53 149-210-165-102 sshd[13438]: Invalid user accounts from 42.193.54.22 Apr 25 02:47:53 149-210-165-102 sshd[13439]: input_userauth_request: invalid user accounts Apr 25 02:47:53 149-210-165-102 sshd[13438]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:53 149-210-165-102 sshd[13438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:47:54 149-210-165-102 sshd[13430]: Failed password for root from 186.210.115.15 port 55844 ssh2 Apr 25 02:47:54 149-210-165-102 sshd[13432]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:47:54 149-210-165-102 sshd[13433]: Failed password for invalid user alfred from 154.8.233.56 port 53188 ssh2 Apr 25 02:47:55 149-210-165-102 sshd[13435]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:47:55 149-210-165-102 sshd[13438]: Failed password for invalid user accounts from 42.193.54.22 port 59820 ssh2 Apr 25 02:47:55 149-210-165-102 sshd[13439]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:47:56 149-210-165-102 sshd[13453]: Invalid user vitaly from 47.254.179.224 Apr 25 02:47:56 149-210-165-102 sshd[13455]: input_userauth_request: invalid user vitaly Apr 25 02:47:56 149-210-165-102 sshd[13453]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:56 149-210-165-102 sshd[13453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:47:57 149-210-165-102 sshd[13456]: Invalid user motion from 170.106.100.61 Apr 25 02:47:57 149-210-165-102 sshd[13458]: input_userauth_request: invalid user motion Apr 25 02:47:57 149-210-165-102 sshd[13456]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:47:57 149-210-165-102 sshd[13456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:47:58 149-210-165-102 sshd[13453]: Failed password for invalid user vitaly from 47.254.179.224 port 48418 ssh2 Apr 25 02:47:58 149-210-165-102 sshd[13455]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:47:59 149-210-165-102 sshd[13456]: Failed password for invalid user motion from 170.106.100.61 port 44932 ssh2 Apr 25 02:47:59 149-210-165-102 sshd[13458]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:48:11 149-210-165-102 sshd[13506]: Invalid user kf from 124.156.239.240 Apr 25 02:48:11 149-210-165-102 sshd[13509]: input_userauth_request: invalid user kf Apr 25 02:48:11 149-210-165-102 sshd[13506]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:11 149-210-165-102 sshd[13506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:48:11 149-210-165-102 sshd[13507]: Invalid user tomcat from 42.192.118.249 Apr 25 02:48:11 149-210-165-102 sshd[13510]: input_userauth_request: invalid user tomcat Apr 25 02:48:11 149-210-165-102 sshd[13507]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:11 149-210-165-102 sshd[13507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:48:13 149-210-165-102 sshd[13506]: Failed password for invalid user kf from 124.156.239.240 port 44220 ssh2 Apr 25 02:48:13 149-210-165-102 sshd[13507]: Failed password for invalid user tomcat from 42.192.118.249 port 57828 ssh2 Apr 25 02:48:13 149-210-165-102 sshd[13509]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:48:13 149-210-165-102 sshd[13510]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:48:15 149-210-165-102 sshd[13516]: Invalid user cms from 121.4.71.96 Apr 25 02:48:15 149-210-165-102 sshd[13519]: input_userauth_request: invalid user cms Apr 25 02:48:15 149-210-165-102 sshd[13516]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:15 149-210-165-102 sshd[13516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:48:17 149-210-165-102 sshd[13516]: Failed password for invalid user cms from 121.4.71.96 port 52650 ssh2 Apr 25 02:48:17 149-210-165-102 sshd[13519]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:48:21 149-210-165-102 sshd[13544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:48:22 149-210-165-102 sshd[13545]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:48:22 149-210-165-102 sshd[13545]: Invalid user test from 186.206.157.74 Apr 25 02:48:22 149-210-165-102 sshd[13548]: input_userauth_request: invalid user test Apr 25 02:48:22 149-210-165-102 sshd[13545]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:22 149-210-165-102 sshd[13545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:48:23 149-210-165-102 sshd[13544]: Failed password for root from 199.195.252.236 port 38350 ssh2 Apr 25 02:48:23 149-210-165-102 sshd[13546]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:48:23 149-210-165-102 sshd[13550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 user=ftpuser Apr 25 02:48:24 149-210-165-102 sshd[13545]: Failed password for invalid user test from 186.206.157.74 port 35450 ssh2 Apr 25 02:48:24 149-210-165-102 sshd[13548]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:48:25 149-210-165-102 sshd[13550]: Failed password for ftpuser from 121.5.166.237 port 57554 ssh2 Apr 25 02:48:25 149-210-165-102 sshd[13553]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:48:27 149-210-165-102 sshd[13562]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:48:27 149-210-165-102 sshd[13562]: Invalid user user1 from 103.118.42.205 Apr 25 02:48:27 149-210-165-102 sshd[13563]: input_userauth_request: invalid user user1 Apr 25 02:48:27 149-210-165-102 sshd[13562]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:27 149-210-165-102 sshd[13562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:48:29 149-210-165-102 sshd[13562]: Failed password for invalid user user1 from 103.118.42.205 port 34156 ssh2 Apr 25 02:48:29 149-210-165-102 sshd[13563]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:48:33 149-210-165-102 sshd[13583]: Invalid user testtest from 119.28.61.47 Apr 25 02:48:33 149-210-165-102 sshd[13584]: input_userauth_request: invalid user testtest Apr 25 02:48:33 149-210-165-102 sshd[13583]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:33 149-210-165-102 sshd[13583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:48:34 149-210-165-102 sshd[13583]: Failed password for invalid user testtest from 119.28.61.47 port 37262 ssh2 Apr 25 02:48:35 149-210-165-102 sshd[13584]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:48:36 149-210-165-102 sshd[13579]: Invalid user arnav from 150.109.252.206 Apr 25 02:48:36 149-210-165-102 sshd[13581]: input_userauth_request: invalid user arnav Apr 25 02:48:36 149-210-165-102 sshd[13579]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:36 149-210-165-102 sshd[13579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:48:36 149-210-165-102 sshd[13594]: Invalid user ericsson from 152.136.122.126 Apr 25 02:48:36 149-210-165-102 sshd[13598]: input_userauth_request: invalid user ericsson Apr 25 02:48:36 149-210-165-102 sshd[13594]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:36 149-210-165-102 sshd[13594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:48:37 149-210-165-102 sshd[13579]: Failed password for invalid user arnav from 150.109.252.206 port 57636 ssh2 Apr 25 02:48:38 149-210-165-102 sshd[13594]: Failed password for invalid user ericsson from 152.136.122.126 port 48702 ssh2 Apr 25 02:48:38 149-210-165-102 sshd[13598]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:48:40 149-210-165-102 sshd[13581]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:48:59 149-210-165-102 sshd[13659]: Invalid user fan from 178.128.210.45 Apr 25 02:48:59 149-210-165-102 sshd[13660]: input_userauth_request: invalid user fan Apr 25 02:48:59 149-210-165-102 sshd[13659]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:48:59 149-210-165-102 sshd[13659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:49:01 149-210-165-102 sshd[13659]: Failed password for invalid user fan from 178.128.210.45 port 50540 ssh2 Apr 25 02:49:02 149-210-165-102 sshd[13660]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:49:07 149-210-165-102 sshd[13689]: Invalid user nagios from 170.106.100.61 Apr 25 02:49:07 149-210-165-102 sshd[13690]: input_userauth_request: invalid user nagios Apr 25 02:49:07 149-210-165-102 sshd[13689]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:07 149-210-165-102 sshd[13689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:49:09 149-210-165-102 sshd[13694]: Invalid user dev from 41.207.251.106 Apr 25 02:49:09 149-210-165-102 sshd[13696]: input_userauth_request: invalid user dev Apr 25 02:49:09 149-210-165-102 sshd[13694]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:09 149-210-165-102 sshd[13694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.251.106 Apr 25 02:49:09 149-210-165-102 sshd[13689]: Failed password for invalid user nagios from 170.106.100.61 port 36498 ssh2 Apr 25 02:49:09 149-210-165-102 sshd[13690]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:49:10 149-210-165-102 sshd[13694]: Failed password for invalid user dev from 41.207.251.106 port 36066 ssh2 Apr 25 02:49:10 149-210-165-102 sshd[13696]: Received disconnect from 41.207.251.106: 11: Bye Bye Apr 25 02:49:27 149-210-165-102 sshd[13742]: Invalid user fan from 42.193.54.22 Apr 25 02:49:27 149-210-165-102 sshd[13743]: input_userauth_request: invalid user fan Apr 25 02:49:27 149-210-165-102 sshd[13742]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:27 149-210-165-102 sshd[13742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:49:30 149-210-165-102 sshd[13744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 user=root Apr 25 02:49:30 149-210-165-102 sshd[13742]: Failed password for invalid user fan from 42.193.54.22 port 55982 ssh2 Apr 25 02:49:30 149-210-165-102 sshd[13743]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:49:31 149-210-165-102 sshd[13744]: Failed password for root from 42.192.118.249 port 49094 ssh2 Apr 25 02:49:32 149-210-165-102 sshd[13745]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:49:32 149-210-165-102 sshd[13746]: Invalid user arlene from 152.136.122.126 Apr 25 02:49:32 149-210-165-102 sshd[13747]: input_userauth_request: invalid user arlene Apr 25 02:49:32 149-210-165-102 sshd[13746]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:32 149-210-165-102 sshd[13746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:49:34 149-210-165-102 sshd[13746]: Failed password for invalid user arlene from 152.136.122.126 port 63218 ssh2 Apr 25 02:49:35 149-210-165-102 sshd[13747]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:49:44 149-210-165-102 sshd[13750]: Invalid user vnc from 45.248.68.206 Apr 25 02:49:44 149-210-165-102 sshd[13751]: input_userauth_request: invalid user vnc Apr 25 02:49:44 149-210-165-102 sshd[13750]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:44 149-210-165-102 sshd[13750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:49:46 149-210-165-102 sshd[13750]: Failed password for invalid user vnc from 45.248.68.206 port 37090 ssh2 Apr 25 02:49:46 149-210-165-102 sshd[13751]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:49:47 149-210-165-102 sshd[13754]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:49:47 149-210-165-102 sshd[13754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:49:48 149-210-165-102 sshd[13753]: Invalid user mike from 180.76.134.229 Apr 25 02:49:48 149-210-165-102 sshd[13755]: input_userauth_request: invalid user mike Apr 25 02:49:48 149-210-165-102 sshd[13753]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:48 149-210-165-102 sshd[13753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:49:49 149-210-165-102 sshd[13754]: Failed password for root from 186.206.157.74 port 64042 ssh2 Apr 25 02:49:49 149-210-165-102 sshd[13756]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:49:50 149-210-165-102 sshd[13753]: Failed password for invalid user mike from 180.76.134.229 port 32992 ssh2 Apr 25 02:49:50 149-210-165-102 sshd[13755]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:49:54 149-210-165-102 sshd[13758]: Did not receive identification string from 110.83.32.186 Apr 25 02:49:54 149-210-165-102 sshd[13757]: Did not receive identification string from 223.166.75.135 Apr 25 02:49:54 149-210-165-102 sshd[13759]: Did not receive identification string from 49.113.96.121 Apr 25 02:49:57 149-210-165-102 sshd[13760]: Invalid user ascension from 81.68.109.37 Apr 25 02:49:57 149-210-165-102 sshd[13761]: input_userauth_request: invalid user ascension Apr 25 02:49:57 149-210-165-102 sshd[13760]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:49:57 149-210-165-102 sshd[13760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:49:59 149-210-165-102 sshd[13760]: Failed password for invalid user ascension from 81.68.109.37 port 57246 ssh2 Apr 25 02:50:01 149-210-165-102 sshd[13761]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:50:05 149-210-165-102 sshd[13785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 user=root Apr 25 02:50:06 149-210-165-102 sshd[13785]: Failed password for root from 140.143.230.41 port 54002 ssh2 Apr 25 02:50:07 149-210-165-102 sshd[13786]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:50:07 149-210-165-102 sshd[13792]: Invalid user alicia from 121.4.71.96 Apr 25 02:50:07 149-210-165-102 sshd[13794]: input_userauth_request: invalid user alicia Apr 25 02:50:07 149-210-165-102 sshd[13792]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:07 149-210-165-102 sshd[13792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:50:09 149-210-165-102 sshd[13792]: Failed password for invalid user alicia from 121.4.71.96 port 46932 ssh2 Apr 25 02:50:09 149-210-165-102 sshd[13794]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:50:12 149-210-165-102 sshd[13795]: Invalid user bone from 199.195.252.236 Apr 25 02:50:12 149-210-165-102 sshd[13797]: input_userauth_request: invalid user bone Apr 25 02:50:12 149-210-165-102 sshd[13795]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:12 149-210-165-102 sshd[13795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:50:14 149-210-165-102 sshd[13795]: Failed password for invalid user bone from 199.195.252.236 port 43236 ssh2 Apr 25 02:50:14 149-210-165-102 sshd[13797]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:50:16 149-210-165-102 sshd[13798]: Invalid user beni from 154.8.233.56 Apr 25 02:50:16 149-210-165-102 sshd[13800]: input_userauth_request: invalid user beni Apr 25 02:50:16 149-210-165-102 sshd[13798]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:16 149-210-165-102 sshd[13798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:50:18 149-210-165-102 sshd[13802]: Invalid user francis from 170.106.100.61 Apr 25 02:50:18 149-210-165-102 sshd[13803]: input_userauth_request: invalid user francis Apr 25 02:50:18 149-210-165-102 sshd[13802]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:18 149-210-165-102 sshd[13802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:50:19 149-210-165-102 sshd[13798]: Failed password for invalid user beni from 154.8.233.56 port 54720 ssh2 Apr 25 02:50:19 149-210-165-102 sshd[13800]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:50:19 149-210-165-102 sshd[13802]: Failed password for invalid user francis from 170.106.100.61 port 56280 ssh2 Apr 25 02:50:19 149-210-165-102 sshd[13803]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:50:25 149-210-165-102 sshd[13808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 user=ftpuser Apr 25 02:50:26 149-210-165-102 sshd[13809]: Connection closed by 121.5.23.61 Apr 25 02:50:27 149-210-165-102 sshd[13808]: Failed password for ftpuser from 124.156.239.240 port 53174 ssh2 Apr 25 02:50:27 149-210-165-102 sshd[13810]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:50:30 149-210-165-102 sshd[13814]: Invalid user norma from 152.136.122.126 Apr 25 02:50:30 149-210-165-102 sshd[13815]: input_userauth_request: invalid user norma Apr 25 02:50:30 149-210-165-102 sshd[13814]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:30 149-210-165-102 sshd[13814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:50:32 149-210-165-102 sshd[13814]: Failed password for invalid user norma from 152.136.122.126 port 13754 ssh2 Apr 25 02:50:32 149-210-165-102 sshd[13815]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:50:49 149-210-165-102 sshd[13825]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:50:49 149-210-165-102 sshd[13825]: Invalid user oraprod from 103.118.42.205 Apr 25 02:50:49 149-210-165-102 sshd[13826]: input_userauth_request: invalid user oraprod Apr 25 02:50:49 149-210-165-102 sshd[13825]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:49 149-210-165-102 sshd[13825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:50:49 149-210-165-102 sshd[13827]: Invalid user remote from 42.192.118.249 Apr 25 02:50:49 149-210-165-102 sshd[13828]: input_userauth_request: invalid user remote Apr 25 02:50:49 149-210-165-102 sshd[13827]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:49 149-210-165-102 sshd[13827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:50:51 149-210-165-102 sshd[13825]: Failed password for invalid user oraprod from 103.118.42.205 port 52350 ssh2 Apr 25 02:50:51 149-210-165-102 sshd[13827]: Failed password for invalid user remote from 42.192.118.249 port 40368 ssh2 Apr 25 02:50:52 149-210-165-102 sshd[13826]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:50:52 149-210-165-102 sshd[13828]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:50:58 149-210-165-102 sshd[13837]: Invalid user ts3 from 47.254.179.224 Apr 25 02:50:58 149-210-165-102 sshd[13838]: input_userauth_request: invalid user ts3 Apr 25 02:50:58 149-210-165-102 sshd[13837]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:50:58 149-210-165-102 sshd[13837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:51:00 149-210-165-102 sshd[13837]: Failed password for invalid user ts3 from 47.254.179.224 port 59320 ssh2 Apr 25 02:51:00 149-210-165-102 sshd[13838]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:51:06 149-210-165-102 sshd[13850]: Invalid user praveen from 42.193.54.22 Apr 25 02:51:06 149-210-165-102 sshd[13851]: input_userauth_request: invalid user praveen Apr 25 02:51:06 149-210-165-102 sshd[13850]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:06 149-210-165-102 sshd[13850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:51:08 149-210-165-102 sshd[13850]: Failed password for invalid user praveen from 42.193.54.22 port 52140 ssh2 Apr 25 02:51:09 149-210-165-102 sshd[13851]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:51:14 149-210-165-102 sshd[13855]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:51:14 149-210-165-102 sshd[13855]: Invalid user sinusbot from 186.206.157.74 Apr 25 02:51:14 149-210-165-102 sshd[13856]: input_userauth_request: invalid user sinusbot Apr 25 02:51:14 149-210-165-102 sshd[13855]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:14 149-210-165-102 sshd[13855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:51:15 149-210-165-102 sshd[13855]: Failed password for invalid user sinusbot from 186.206.157.74 port 21599 ssh2 Apr 25 02:51:16 149-210-165-102 sshd[13856]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:51:21 149-210-165-102 sshd[13861]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:51:21 149-210-165-102 sshd[13861]: Invalid user ruser from 177.134.160.29 Apr 25 02:51:21 149-210-165-102 sshd[13862]: input_userauth_request: invalid user ruser Apr 25 02:51:21 149-210-165-102 sshd[13861]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:21 149-210-165-102 sshd[13861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:51:23 149-210-165-102 sshd[13861]: Failed password for invalid user ruser from 177.134.160.29 port 41529 ssh2 Apr 25 02:51:24 149-210-165-102 sshd[13862]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:51:25 149-210-165-102 sshd[13865]: Invalid user user from 152.136.122.126 Apr 25 02:51:25 149-210-165-102 sshd[13866]: input_userauth_request: invalid user user Apr 25 02:51:25 149-210-165-102 sshd[13865]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:25 149-210-165-102 sshd[13865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:51:27 149-210-165-102 sshd[13867]: Invalid user tom from 170.106.100.61 Apr 25 02:51:27 149-210-165-102 sshd[13868]: input_userauth_request: invalid user tom Apr 25 02:51:27 149-210-165-102 sshd[13867]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:27 149-210-165-102 sshd[13867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:51:27 149-210-165-102 sshd[13865]: Failed password for invalid user user from 152.136.122.126 port 28266 ssh2 Apr 25 02:51:27 149-210-165-102 sshd[13866]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:51:27 149-210-165-102 sshd[13863]: Invalid user arnav from 178.128.210.45 Apr 25 02:51:27 149-210-165-102 sshd[13864]: input_userauth_request: invalid user arnav Apr 25 02:51:27 149-210-165-102 sshd[13863]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:27 149-210-165-102 sshd[13863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:51:29 149-210-165-102 sshd[13867]: Failed password for invalid user tom from 170.106.100.61 port 47828 ssh2 Apr 25 02:51:29 149-210-165-102 sshd[13868]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:51:29 149-210-165-102 sshd[13863]: Failed password for invalid user arnav from 178.128.210.45 port 52366 ssh2 Apr 25 02:51:30 149-210-165-102 sshd[13864]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:51:47 149-210-165-102 sshd[13872]: Invalid user change from 121.5.166.237 Apr 25 02:51:47 149-210-165-102 sshd[13873]: input_userauth_request: invalid user change Apr 25 02:51:47 149-210-165-102 sshd[13872]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:47 149-210-165-102 sshd[13872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:51:50 149-210-165-102 sshd[13872]: Failed password for invalid user change from 121.5.166.237 port 37424 ssh2 Apr 25 02:51:51 149-210-165-102 sshd[13875]: Invalid user adelin from 119.28.61.47 Apr 25 02:51:51 149-210-165-102 sshd[13876]: input_userauth_request: invalid user adelin Apr 25 02:51:51 149-210-165-102 sshd[13875]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:51 149-210-165-102 sshd[13875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:51:52 149-210-165-102 sshd[13873]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:51:52 149-210-165-102 sshd[13878]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:51:52 149-210-165-102 sshd[13878]: Invalid user design from 186.210.115.15 Apr 25 02:51:52 149-210-165-102 sshd[13879]: input_userauth_request: invalid user design Apr 25 02:51:52 149-210-165-102 sshd[13878]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:52 149-210-165-102 sshd[13878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:51:53 149-210-165-102 sshd[13875]: Failed password for invalid user adelin from 119.28.61.47 port 34102 ssh2 Apr 25 02:51:53 149-210-165-102 sshd[13880]: Invalid user hadoop from 45.248.68.206 Apr 25 02:51:53 149-210-165-102 sshd[13881]: input_userauth_request: invalid user hadoop Apr 25 02:51:53 149-210-165-102 sshd[13880]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:53 149-210-165-102 sshd[13880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:51:53 149-210-165-102 sshd[13876]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:51:54 149-210-165-102 sshd[13878]: Failed password for invalid user design from 186.210.115.15 port 58358 ssh2 Apr 25 02:51:54 149-210-165-102 sshd[13879]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:51:56 149-210-165-102 sshd[13880]: Failed password for invalid user hadoop from 45.248.68.206 port 35526 ssh2 Apr 25 02:51:56 149-210-165-102 sshd[13881]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:51:57 149-210-165-102 sshd[13869]: Invalid user sascha from 129.146.140.161 Apr 25 02:51:57 149-210-165-102 sshd[13870]: input_userauth_request: invalid user sascha Apr 25 02:51:57 149-210-165-102 sshd[13869]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:51:57 149-210-165-102 sshd[13869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:51:59 149-210-165-102 sshd[13869]: Failed password for invalid user sascha from 129.146.140.161 port 40508 ssh2 Apr 25 02:51:59 149-210-165-102 sshd[13870]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:52:00 149-210-165-102 sshd[13883]: Invalid user tomcat from 180.76.134.229 Apr 25 02:52:00 149-210-165-102 sshd[13884]: input_userauth_request: invalid user tomcat Apr 25 02:52:00 149-210-165-102 sshd[13883]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:00 149-210-165-102 sshd[13883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:52:02 149-210-165-102 sshd[13883]: Failed password for invalid user tomcat from 180.76.134.229 port 37626 ssh2 Apr 25 02:52:02 149-210-165-102 sshd[13884]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:52:04 149-210-165-102 sshd[13887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:52:04 149-210-165-102 sshd[13885]: Invalid user videolan from 121.4.71.96 Apr 25 02:52:04 149-210-165-102 sshd[13886]: input_userauth_request: invalid user videolan Apr 25 02:52:04 149-210-165-102 sshd[13885]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:04 149-210-165-102 sshd[13885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:52:06 149-210-165-102 sshd[13887]: Failed password for root from 199.195.252.236 port 48116 ssh2 Apr 25 02:52:06 149-210-165-102 sshd[13885]: Failed password for invalid user videolan from 121.4.71.96 port 41206 ssh2 Apr 25 02:52:06 149-210-165-102 sshd[13888]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:52:07 149-210-165-102 sshd[13886]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:52:08 149-210-165-102 sshd[13894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 user=root Apr 25 02:52:09 149-210-165-102 sshd[13894]: Failed password for root from 42.192.118.249 port 59864 ssh2 Apr 25 02:52:10 149-210-165-102 sshd[13895]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:52:25 149-210-165-102 sshd[13910]: Invalid user sjen from 152.136.122.126 Apr 25 02:52:25 149-210-165-102 sshd[13911]: input_userauth_request: invalid user sjen Apr 25 02:52:25 149-210-165-102 sshd[13910]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:25 149-210-165-102 sshd[13910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:52:27 149-210-165-102 sshd[13910]: Failed password for invalid user sjen from 152.136.122.126 port 42776 ssh2 Apr 25 02:52:27 149-210-165-102 sshd[13911]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:52:34 149-210-165-102 sshd[13915]: Invalid user patrick from 154.8.233.56 Apr 25 02:52:34 149-210-165-102 sshd[13916]: input_userauth_request: invalid user patrick Apr 25 02:52:34 149-210-165-102 sshd[13915]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:34 149-210-165-102 sshd[13915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:52:36 149-210-165-102 sshd[13915]: Failed password for invalid user patrick from 154.8.233.56 port 56250 ssh2 Apr 25 02:52:37 149-210-165-102 sshd[13916]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:52:38 149-210-165-102 sshd[13918]: Invalid user upload1 from 124.156.239.240 Apr 25 02:52:38 149-210-165-102 sshd[13919]: input_userauth_request: invalid user upload1 Apr 25 02:52:38 149-210-165-102 sshd[13918]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:38 149-210-165-102 sshd[13918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:52:40 149-210-165-102 sshd[13913]: Invalid user test from 150.109.252.206 Apr 25 02:52:40 149-210-165-102 sshd[13914]: input_userauth_request: invalid user test Apr 25 02:52:40 149-210-165-102 sshd[13913]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:40 149-210-165-102 sshd[13913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 02:52:40 149-210-165-102 sshd[13918]: Failed password for invalid user upload1 from 124.156.239.240 port 33890 ssh2 Apr 25 02:52:40 149-210-165-102 sshd[13919]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:52:42 149-210-165-102 sshd[13921]: Invalid user petey from 170.106.100.61 Apr 25 02:52:42 149-210-165-102 sshd[13923]: input_userauth_request: invalid user petey Apr 25 02:52:42 149-210-165-102 sshd[13921]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:42 149-210-165-102 sshd[13921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:52:42 149-210-165-102 sshd[13913]: Failed password for invalid user test from 150.109.252.206 port 59680 ssh2 Apr 25 02:52:42 149-210-165-102 sshd[13920]: Invalid user adam from 42.193.54.22 Apr 25 02:52:42 149-210-165-102 sshd[13922]: input_userauth_request: invalid user adam Apr 25 02:52:42 149-210-165-102 sshd[13920]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:42 149-210-165-102 sshd[13920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:52:42 149-210-165-102 sshd[13914]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:52:43 149-210-165-102 sshd[13921]: Failed password for invalid user petey from 170.106.100.61 port 39384 ssh2 Apr 25 02:52:44 149-210-165-102 sshd[13923]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:52:44 149-210-165-102 sshd[13920]: Failed password for invalid user adam from 42.193.54.22 port 48322 ssh2 Apr 25 02:52:44 149-210-165-102 sshd[13922]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:52:46 149-210-165-102 sshd[13924]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:52:46 149-210-165-102 sshd[13924]: Invalid user tempuser from 186.206.157.74 Apr 25 02:52:46 149-210-165-102 sshd[13925]: input_userauth_request: invalid user tempuser Apr 25 02:52:46 149-210-165-102 sshd[13924]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:52:46 149-210-165-102 sshd[13924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:52:48 149-210-165-102 sshd[13924]: Failed password for invalid user tempuser from 186.206.157.74 port 6619 ssh2 Apr 25 02:52:48 149-210-165-102 sshd[13925]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:52:57 149-210-165-102 sshd[13927]: Connection closed by 81.68.109.37 Apr 25 02:53:02 149-210-165-102 sshd[13933]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:53:02 149-210-165-102 sshd[13933]: Invalid user testwww from 103.118.42.205 Apr 25 02:53:02 149-210-165-102 sshd[13934]: input_userauth_request: invalid user testwww Apr 25 02:53:02 149-210-165-102 sshd[13933]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:02 149-210-165-102 sshd[13933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:53:04 149-210-165-102 sshd[13933]: Failed password for invalid user testwww from 103.118.42.205 port 41838 ssh2 Apr 25 02:53:04 149-210-165-102 sshd[13934]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:53:20 149-210-165-102 sshd[13953]: Invalid user ansible from 152.136.122.126 Apr 25 02:53:20 149-210-165-102 sshd[13954]: input_userauth_request: invalid user ansible Apr 25 02:53:20 149-210-165-102 sshd[13953]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:20 149-210-165-102 sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:53:22 149-210-165-102 sshd[13953]: Failed password for invalid user ansible from 152.136.122.126 port 57286 ssh2 Apr 25 02:53:22 149-210-165-102 sshd[13954]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:53:25 149-210-165-102 sshd[13956]: Invalid user das from 42.192.118.249 Apr 25 02:53:25 149-210-165-102 sshd[13957]: input_userauth_request: invalid user das Apr 25 02:53:25 149-210-165-102 sshd[13956]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:25 149-210-165-102 sshd[13956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:53:26 149-210-165-102 sshd[13956]: Failed password for invalid user das from 42.192.118.249 port 51130 ssh2 Apr 25 02:53:27 149-210-165-102 sshd[13957]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:53:42 149-210-165-102 sshd[13959]: Invalid user fc from 140.143.230.41 Apr 25 02:53:42 149-210-165-102 sshd[13961]: input_userauth_request: invalid user fc Apr 25 02:53:43 149-210-165-102 sshd[13959]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:43 149-210-165-102 sshd[13959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:53:44 149-210-165-102 sshd[13959]: Failed password for invalid user fc from 140.143.230.41 port 36492 ssh2 Apr 25 02:53:44 149-210-165-102 sshd[13961]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:53:48 149-210-165-102 sshd[13965]: Invalid user mtm from 121.5.23.61 Apr 25 02:53:48 149-210-165-102 sshd[13966]: input_userauth_request: invalid user mtm Apr 25 02:53:48 149-210-165-102 sshd[13965]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:48 149-210-165-102 sshd[13965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 02:53:49 149-210-165-102 sshd[13968]: Invalid user nux from 170.106.100.61 Apr 25 02:53:49 149-210-165-102 sshd[13969]: input_userauth_request: invalid user nux Apr 25 02:53:49 149-210-165-102 sshd[13968]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:49 149-210-165-102 sshd[13968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:53:50 149-210-165-102 sshd[13965]: Failed password for invalid user mtm from 121.5.23.61 port 37332 ssh2 Apr 25 02:53:50 149-210-165-102 sshd[13966]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 02:53:50 149-210-165-102 sshd[13975]: Invalid user ciro from 199.195.252.236 Apr 25 02:53:50 149-210-165-102 sshd[13976]: input_userauth_request: invalid user ciro Apr 25 02:53:50 149-210-165-102 sshd[13975]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:50 149-210-165-102 sshd[13975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:53:51 149-210-165-102 sshd[13968]: Failed password for invalid user nux from 170.106.100.61 port 59164 ssh2 Apr 25 02:53:51 149-210-165-102 sshd[13969]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:53:52 149-210-165-102 sshd[13970]: Invalid user build from 178.128.210.45 Apr 25 02:53:52 149-210-165-102 sshd[13971]: input_userauth_request: invalid user build Apr 25 02:53:52 149-210-165-102 sshd[13970]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:52 149-210-165-102 sshd[13970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:53:52 149-210-165-102 sshd[13973]: Invalid user test123 from 47.254.179.224 Apr 25 02:53:52 149-210-165-102 sshd[13974]: input_userauth_request: invalid user test123 Apr 25 02:53:52 149-210-165-102 sshd[13973]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:52 149-210-165-102 sshd[13973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:53:52 149-210-165-102 sshd[13975]: Failed password for invalid user ciro from 199.195.252.236 port 53004 ssh2 Apr 25 02:53:52 149-210-165-102 sshd[13976]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:53:54 149-210-165-102 sshd[13970]: Failed password for invalid user build from 178.128.210.45 port 54198 ssh2 Apr 25 02:53:54 149-210-165-102 sshd[13971]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:53:54 149-210-165-102 sshd[13973]: Failed password for invalid user test123 from 47.254.179.224 port 41982 ssh2 Apr 25 02:53:54 149-210-165-102 sshd[13974]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:53:54 149-210-165-102 sshd[13978]: Invalid user server from 121.4.71.96 Apr 25 02:53:54 149-210-165-102 sshd[13979]: input_userauth_request: invalid user server Apr 25 02:53:54 149-210-165-102 sshd[13978]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:53:54 149-210-165-102 sshd[13978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:53:56 149-210-165-102 sshd[13978]: Failed password for invalid user server from 121.4.71.96 port 35474 ssh2 Apr 25 02:53:57 149-210-165-102 sshd[13979]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:54:00 149-210-165-102 sshd[13984]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:54:00 149-210-165-102 sshd[13984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 user=root Apr 25 02:54:02 149-210-165-102 sshd[13984]: Failed password for root from 186.210.115.15 port 60874 ssh2 Apr 25 02:54:02 149-210-165-102 sshd[13985]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:54:10 149-210-165-102 sshd[13996]: Invalid user glen from 45.248.68.206 Apr 25 02:54:10 149-210-165-102 sshd[13997]: input_userauth_request: invalid user glen Apr 25 02:54:10 149-210-165-102 sshd[13996]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:10 149-210-165-102 sshd[13996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:54:12 149-210-165-102 sshd[13996]: Failed password for invalid user glen from 45.248.68.206 port 33962 ssh2 Apr 25 02:54:12 149-210-165-102 sshd[13997]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:54:15 149-210-165-102 sshd[14010]: Invalid user robot from 42.193.54.22 Apr 25 02:54:15 149-210-165-102 sshd[14012]: input_userauth_request: invalid user robot Apr 25 02:54:15 149-210-165-102 sshd[14010]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:15 149-210-165-102 sshd[14010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:54:15 149-210-165-102 sshd[14009]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:54:15 149-210-165-102 sshd[14009]: Invalid user ghost from 186.206.157.74 Apr 25 02:54:15 149-210-165-102 sshd[14011]: input_userauth_request: invalid user ghost Apr 25 02:54:15 149-210-165-102 sshd[14009]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:15 149-210-165-102 sshd[14009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:54:17 149-210-165-102 sshd[14010]: Failed password for invalid user robot from 42.193.54.22 port 44468 ssh2 Apr 25 02:54:17 149-210-165-102 sshd[14009]: Failed password for invalid user ghost from 186.206.157.74 port 27892 ssh2 Apr 25 02:54:17 149-210-165-102 sshd[14012]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:54:18 149-210-165-102 sshd[14019]: Invalid user ubuntu from 152.136.122.126 Apr 25 02:54:18 149-210-165-102 sshd[14021]: input_userauth_request: invalid user ubuntu Apr 25 02:54:18 149-210-165-102 sshd[14019]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:18 149-210-165-102 sshd[14019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:54:18 149-210-165-102 sshd[14011]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:54:19 149-210-165-102 sshd[14019]: Failed password for invalid user ubuntu from 152.136.122.126 port 7838 ssh2 Apr 25 02:54:19 149-210-165-102 sshd[14021]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:54:22 149-210-165-102 sshd[14004]: Connection closed by 180.76.134.229 Apr 25 02:54:39 149-210-165-102 sshd[14032]: Invalid user ankit from 42.192.118.249 Apr 25 02:54:39 149-210-165-102 sshd[14033]: input_userauth_request: invalid user ankit Apr 25 02:54:39 149-210-165-102 sshd[14032]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:39 149-210-165-102 sshd[14032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:54:41 149-210-165-102 sshd[14032]: Failed password for invalid user ankit from 42.192.118.249 port 42394 ssh2 Apr 25 02:54:41 149-210-165-102 sshd[14033]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:54:52 149-210-165-102 sshd[14040]: Invalid user iso from 124.156.239.240 Apr 25 02:54:52 149-210-165-102 sshd[14041]: input_userauth_request: invalid user iso Apr 25 02:54:52 149-210-165-102 sshd[14040]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:52 149-210-165-102 sshd[14040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:54:54 149-210-165-102 sshd[14040]: Failed password for invalid user iso from 124.156.239.240 port 42868 ssh2 Apr 25 02:54:55 149-210-165-102 sshd[14041]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:54:56 149-210-165-102 sshd[14046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 user=root Apr 25 02:54:58 149-210-165-102 sshd[14046]: Failed password for root from 170.106.100.61 port 50708 ssh2 Apr 25 02:54:58 149-210-165-102 sshd[14047]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:54:59 149-210-165-102 sshd[14051]: Invalid user bear from 154.8.233.56 Apr 25 02:54:59 149-210-165-102 sshd[14052]: input_userauth_request: invalid user bear Apr 25 02:54:59 149-210-165-102 sshd[14051]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:54:59 149-210-165-102 sshd[14051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:55:00 149-210-165-102 sshd[14048]: Invalid user thomas from 119.28.61.47 Apr 25 02:55:00 149-210-165-102 sshd[14050]: input_userauth_request: invalid user thomas Apr 25 02:55:00 149-210-165-102 sshd[14048]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:00 149-210-165-102 sshd[14048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:55:01 149-210-165-102 sshd[14051]: Failed password for invalid user bear from 154.8.233.56 port 57784 ssh2 Apr 25 02:55:01 149-210-165-102 sshd[14052]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:55:02 149-210-165-102 sshd[14048]: Failed password for invalid user thomas from 119.28.61.47 port 59026 ssh2 Apr 25 02:55:02 149-210-165-102 sshd[14050]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:55:03 149-210-165-102 sshd[14055]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:55:03 149-210-165-102 sshd[14055]: Invalid user redmine from 177.134.160.29 Apr 25 02:55:03 149-210-165-102 sshd[14056]: input_userauth_request: invalid user redmine Apr 25 02:55:03 149-210-165-102 sshd[14055]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:03 149-210-165-102 sshd[14055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:55:05 149-210-165-102 sshd[14055]: Failed password for invalid user redmine from 177.134.160.29 port 32824 ssh2 Apr 25 02:55:05 149-210-165-102 sshd[14056]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:55:12 149-210-165-102 sshd[14065]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:55:12 149-210-165-102 sshd[14065]: Invalid user nagios from 103.118.42.205 Apr 25 02:55:12 149-210-165-102 sshd[14066]: input_userauth_request: invalid user nagios Apr 25 02:55:12 149-210-165-102 sshd[14065]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:12 149-210-165-102 sshd[14065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:55:13 149-210-165-102 sshd[14065]: Failed password for invalid user nagios from 103.118.42.205 port 59456 ssh2 Apr 25 02:55:14 149-210-165-102 sshd[14066]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:55:14 149-210-165-102 sshd[14067]: Invalid user cliente1 from 121.5.166.237 Apr 25 02:55:14 149-210-165-102 sshd[14068]: input_userauth_request: invalid user cliente1 Apr 25 02:55:14 149-210-165-102 sshd[14067]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:14 149-210-165-102 sshd[14067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 02:55:16 149-210-165-102 sshd[14067]: Failed password for invalid user cliente1 from 121.5.166.237 port 45528 ssh2 Apr 25 02:55:16 149-210-165-102 sshd[14068]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 02:55:17 149-210-165-102 sshd[14072]: Invalid user ubuntu from 152.136.122.126 Apr 25 02:55:17 149-210-165-102 sshd[14073]: input_userauth_request: invalid user ubuntu Apr 25 02:55:17 149-210-165-102 sshd[14072]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:17 149-210-165-102 sshd[14072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:55:19 149-210-165-102 sshd[14072]: Failed password for invalid user ubuntu from 152.136.122.126 port 22348 ssh2 Apr 25 02:55:19 149-210-165-102 sshd[14073]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:55:37 149-210-165-102 sshd[14080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 02:55:40 149-210-165-102 sshd[14080]: Failed password for root from 199.195.252.236 port 57886 ssh2 Apr 25 02:55:40 149-210-165-102 sshd[14081]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:55:40 149-210-165-102 sshd[14084]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:55:40 149-210-165-102 sshd[14084]: Invalid user sg from 186.206.157.74 Apr 25 02:55:40 149-210-165-102 sshd[14086]: input_userauth_request: invalid user sg Apr 25 02:55:40 149-210-165-102 sshd[14084]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:40 149-210-165-102 sshd[14084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:55:40 149-210-165-102 sshd[14082]: Invalid user cbs from 81.68.109.37 Apr 25 02:55:40 149-210-165-102 sshd[14085]: input_userauth_request: invalid user cbs Apr 25 02:55:40 149-210-165-102 sshd[14082]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:40 149-210-165-102 sshd[14082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:55:42 149-210-165-102 sshd[14084]: Failed password for invalid user sg from 186.206.157.74 port 4792 ssh2 Apr 25 02:55:42 149-210-165-102 sshd[14086]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:55:43 149-210-165-102 sshd[14082]: Failed password for invalid user cbs from 81.68.109.37 port 36820 ssh2 Apr 25 02:55:43 149-210-165-102 sshd[14085]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:55:47 149-210-165-102 sshd[14089]: Invalid user juliet from 121.4.71.96 Apr 25 02:55:47 149-210-165-102 sshd[14090]: input_userauth_request: invalid user juliet Apr 25 02:55:47 149-210-165-102 sshd[14089]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:47 149-210-165-102 sshd[14089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:55:49 149-210-165-102 sshd[14089]: Failed password for invalid user juliet from 121.4.71.96 port 57980 ssh2 Apr 25 02:55:49 149-210-165-102 sshd[14090]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:55:51 149-210-165-102 sshd[14092]: Invalid user nb from 42.193.54.22 Apr 25 02:55:51 149-210-165-102 sshd[14093]: input_userauth_request: invalid user nb Apr 25 02:55:51 149-210-165-102 sshd[14092]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:51 149-210-165-102 sshd[14092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:55:53 149-210-165-102 sshd[14092]: Failed password for invalid user nb from 42.193.54.22 port 40626 ssh2 Apr 25 02:55:54 149-210-165-102 sshd[14093]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:55:55 149-210-165-102 sshd[14095]: Invalid user ircd from 42.192.118.249 Apr 25 02:55:55 149-210-165-102 sshd[14096]: input_userauth_request: invalid user ircd Apr 25 02:55:55 149-210-165-102 sshd[14095]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:55:55 149-210-165-102 sshd[14095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:55:57 149-210-165-102 sshd[14095]: Failed password for invalid user ircd from 42.192.118.249 port 33666 ssh2 Apr 25 02:55:57 149-210-165-102 sshd[14096]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:56:07 149-210-165-102 sshd[14105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 user=root Apr 25 02:56:08 149-210-165-102 sshd[14107]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:56:08 149-210-165-102 sshd[14107]: Invalid user dq from 186.210.115.15 Apr 25 02:56:08 149-210-165-102 sshd[14110]: input_userauth_request: invalid user dq Apr 25 02:56:08 149-210-165-102 sshd[14107]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:08 149-210-165-102 sshd[14107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:56:09 149-210-165-102 sshd[14105]: Failed password for root from 170.106.100.61 port 42266 ssh2 Apr 25 02:56:09 149-210-165-102 sshd[14106]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:56:10 149-210-165-102 sshd[14107]: Failed password for invalid user dq from 186.210.115.15 port 35154 ssh2 Apr 25 02:56:11 149-210-165-102 sshd[14110]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:56:12 149-210-165-102 sshd[14113]: Invalid user marco from 178.128.210.45 Apr 25 02:56:12 149-210-165-102 sshd[14114]: input_userauth_request: invalid user marco Apr 25 02:56:12 149-210-165-102 sshd[14113]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:12 149-210-165-102 sshd[14113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:56:13 149-210-165-102 sshd[14116]: Invalid user kent from 152.136.122.126 Apr 25 02:56:13 149-210-165-102 sshd[14117]: input_userauth_request: invalid user kent Apr 25 02:56:13 149-210-165-102 sshd[14116]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:13 149-210-165-102 sshd[14116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:56:14 149-210-165-102 sshd[14113]: Failed password for invalid user marco from 178.128.210.45 port 56016 ssh2 Apr 25 02:56:14 149-210-165-102 sshd[14114]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:56:15 149-210-165-102 sshd[14116]: Failed password for invalid user kent from 152.136.122.126 port 36858 ssh2 Apr 25 02:56:15 149-210-165-102 sshd[14117]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:56:27 149-210-165-102 sshd[14124]: Invalid user marko from 45.248.68.206 Apr 25 02:56:27 149-210-165-102 sshd[14125]: input_userauth_request: invalid user marko Apr 25 02:56:27 149-210-165-102 sshd[14124]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:27 149-210-165-102 sshd[14124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 02:56:28 149-210-165-102 sshd[14126]: Invalid user raymond from 93.188.164.206 Apr 25 02:56:28 149-210-165-102 sshd[14127]: input_userauth_request: invalid user raymond Apr 25 02:56:28 149-210-165-102 sshd[14126]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:28 149-210-165-102 sshd[14126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.188.164.206 Apr 25 02:56:29 149-210-165-102 sshd[14124]: Failed password for invalid user marko from 45.248.68.206 port 60632 ssh2 Apr 25 02:56:29 149-210-165-102 sshd[14125]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:56:30 149-210-165-102 sshd[14126]: Failed password for invalid user raymond from 93.188.164.206 port 45520 ssh2 Apr 25 02:56:30 149-210-165-102 sshd[14127]: Received disconnect from 93.188.164.206: 11: Bye Bye Apr 25 02:56:36 149-210-165-102 sshd[14128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 user=root Apr 25 02:56:37 149-210-165-102 sshd[14132]: Invalid user munin from 180.76.134.229 Apr 25 02:56:37 149-210-165-102 sshd[14133]: input_userauth_request: invalid user munin Apr 25 02:56:37 149-210-165-102 sshd[14132]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:37 149-210-165-102 sshd[14132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:56:38 149-210-165-102 sshd[14128]: Failed password for root from 150.109.252.206 port 33494 ssh2 Apr 25 02:56:39 149-210-165-102 sshd[14132]: Failed password for invalid user munin from 180.76.134.229 port 46894 ssh2 Apr 25 02:56:40 149-210-165-102 sshd[14133]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:56:40 149-210-165-102 sshd[14129]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 02:56:48 149-210-165-102 sshd[14139]: Invalid user abcs from 47.254.179.224 Apr 25 02:56:48 149-210-165-102 sshd[14140]: input_userauth_request: invalid user abcs Apr 25 02:56:48 149-210-165-102 sshd[14139]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:56:48 149-210-165-102 sshd[14139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 02:56:50 149-210-165-102 sshd[14139]: Failed password for invalid user abcs from 47.254.179.224 port 52880 ssh2 Apr 25 02:56:50 149-210-165-102 sshd[14140]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:57:01 149-210-165-102 sshd[14143]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:57:01 149-210-165-102 sshd[14143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 02:57:04 149-210-165-102 sshd[14143]: Failed password for root from 186.206.157.74 port 3084 ssh2 Apr 25 02:57:04 149-210-165-102 sshd[14144]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:57:06 149-210-165-102 sshd[14146]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:57:06 149-210-165-102 sshd[14146]: Invalid user admin from 122.252.231.138 Apr 25 02:57:06 149-210-165-102 sshd[14147]: input_userauth_request: invalid user admin Apr 25 02:57:06 149-210-165-102 sshd[14146]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:06 149-210-165-102 sshd[14146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 02:57:07 149-210-165-102 sshd[14148]: Invalid user postgres from 124.156.239.240 Apr 25 02:57:07 149-210-165-102 sshd[14149]: input_userauth_request: invalid user postgres Apr 25 02:57:07 149-210-165-102 sshd[14148]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:07 149-210-165-102 sshd[14148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:57:08 149-210-165-102 sshd[14146]: Failed password for invalid user admin from 122.252.231.138 port 51232 ssh2 Apr 25 02:57:08 149-210-165-102 sshd[14147]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 02:57:08 149-210-165-102 sshd[14148]: Failed password for invalid user postgres from 124.156.239.240 port 51826 ssh2 Apr 25 02:57:08 149-210-165-102 sshd[14149]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:57:12 149-210-165-102 sshd[14150]: Invalid user codeunbug from 42.192.118.249 Apr 25 02:57:12 149-210-165-102 sshd[14151]: input_userauth_request: invalid user codeunbug Apr 25 02:57:12 149-210-165-102 sshd[14150]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:12 149-210-165-102 sshd[14150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:57:14 149-210-165-102 sshd[14150]: Failed password for invalid user codeunbug from 42.192.118.249 port 53164 ssh2 Apr 25 02:57:14 149-210-165-102 sshd[14151]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:57:14 149-210-165-102 sshd[14154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 02:57:17 149-210-165-102 sshd[14154]: Failed password for root from 152.136.122.126 port 51372 ssh2 Apr 25 02:57:17 149-210-165-102 sshd[14155]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:57:18 149-210-165-102 sshd[14161]: Invalid user markd from 170.106.100.61 Apr 25 02:57:18 149-210-165-102 sshd[14162]: input_userauth_request: invalid user markd Apr 25 02:57:18 149-210-165-102 sshd[14161]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:18 149-210-165-102 sshd[14161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:57:19 149-210-165-102 sshd[14164]: Invalid user blessing from 140.143.230.41 Apr 25 02:57:19 149-210-165-102 sshd[14165]: input_userauth_request: invalid user blessing Apr 25 02:57:19 149-210-165-102 sshd[14164]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:19 149-210-165-102 sshd[14164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 02:57:20 149-210-165-102 sshd[14161]: Failed password for invalid user markd from 170.106.100.61 port 33820 ssh2 Apr 25 02:57:20 149-210-165-102 sshd[14162]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:57:20 149-210-165-102 sshd[14164]: Failed password for invalid user blessing from 140.143.230.41 port 47222 ssh2 Apr 25 02:57:20 149-210-165-102 sshd[14165]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 02:57:22 149-210-165-102 sshd[14166]: Did not receive identification string from 121.5.23.61 Apr 25 02:57:27 149-210-165-102 sshd[14168]: Invalid user pc01 from 154.8.233.56 Apr 25 02:57:27 149-210-165-102 sshd[14169]: input_userauth_request: invalid user pc01 Apr 25 02:57:27 149-210-165-102 sshd[14168]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:27 149-210-165-102 sshd[14168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:57:28 149-210-165-102 sshd[14172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=operator Apr 25 02:57:29 149-210-165-102 sshd[14168]: Failed password for invalid user pc01 from 154.8.233.56 port 59336 ssh2 Apr 25 02:57:29 149-210-165-102 sshd[14169]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:57:29 149-210-165-102 sshd[14172]: Failed password for operator from 199.195.252.236 port 34540 ssh2 Apr 25 02:57:29 149-210-165-102 sshd[14173]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:57:30 149-210-165-102 sshd[14170]: Invalid user kelly from 42.193.54.22 Apr 25 02:57:30 149-210-165-102 sshd[14171]: input_userauth_request: invalid user kelly Apr 25 02:57:30 149-210-165-102 sshd[14170]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:30 149-210-165-102 sshd[14170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:57:30 149-210-165-102 sshd[14174]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:57:30 149-210-165-102 sshd[14174]: Invalid user steam from 103.118.42.205 Apr 25 02:57:30 149-210-165-102 sshd[14176]: input_userauth_request: invalid user steam Apr 25 02:57:30 149-210-165-102 sshd[14174]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:30 149-210-165-102 sshd[14174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 02:57:31 149-210-165-102 sshd[14170]: Failed password for invalid user kelly from 42.193.54.22 port 36800 ssh2 Apr 25 02:57:31 149-210-165-102 sshd[14174]: Failed password for invalid user steam from 103.118.42.205 port 49240 ssh2 Apr 25 02:57:32 149-210-165-102 sshd[14171]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:57:32 149-210-165-102 sshd[14176]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:57:41 149-210-165-102 sshd[14182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 user=root Apr 25 02:57:43 149-210-165-102 sshd[14182]: Failed password for root from 121.4.71.96 port 52260 ssh2 Apr 25 02:57:43 149-210-165-102 sshd[14184]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:57:48 149-210-165-102 sshd[14179]: Invalid user devin from 129.146.140.161 Apr 25 02:57:48 149-210-165-102 sshd[14181]: input_userauth_request: invalid user devin Apr 25 02:57:48 149-210-165-102 sshd[14179]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:57:48 149-210-165-102 sshd[14179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 Apr 25 02:57:51 149-210-165-102 sshd[14179]: Failed password for invalid user devin from 129.146.140.161 port 51934 ssh2 Apr 25 02:57:51 149-210-165-102 sshd[14181]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 02:58:15 149-210-165-102 sshd[14198]: Invalid user arun from 119.28.61.47 Apr 25 02:58:15 149-210-165-102 sshd[14199]: input_userauth_request: invalid user arun Apr 25 02:58:15 149-210-165-102 sshd[14198]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:15 149-210-165-102 sshd[14198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 02:58:15 149-210-165-102 sshd[14203]: Invalid user dns from 152.136.122.126 Apr 25 02:58:15 149-210-165-102 sshd[14204]: input_userauth_request: invalid user dns Apr 25 02:58:15 149-210-165-102 sshd[14203]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:15 149-210-165-102 sshd[14203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:58:17 149-210-165-102 sshd[14198]: Failed password for invalid user arun from 119.28.61.47 port 55712 ssh2 Apr 25 02:58:17 149-210-165-102 sshd[14203]: Failed password for invalid user dns from 152.136.122.126 port 1906 ssh2 Apr 25 02:58:17 149-210-165-102 sshd[14199]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 02:58:17 149-210-165-102 sshd[14204]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:58:19 149-210-165-102 sshd[14208]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:58:19 149-210-165-102 sshd[14208]: Invalid user test from 186.210.115.15 Apr 25 02:58:19 149-210-165-102 sshd[14209]: input_userauth_request: invalid user test Apr 25 02:58:19 149-210-165-102 sshd[14208]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:19 149-210-165-102 sshd[14208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 02:58:21 149-210-165-102 sshd[14208]: Failed password for invalid user test from 186.210.115.15 port 37672 ssh2 Apr 25 02:58:22 149-210-165-102 sshd[14209]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 02:58:25 149-210-165-102 sshd[14211]: Invalid user admin from 178.128.210.45 Apr 25 02:58:25 149-210-165-102 sshd[14212]: input_userauth_request: invalid user admin Apr 25 02:58:25 149-210-165-102 sshd[14211]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:25 149-210-165-102 sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 02:58:26 149-210-165-102 sshd[14211]: Failed password for invalid user admin from 178.128.210.45 port 57844 ssh2 Apr 25 02:58:26 149-210-165-102 sshd[14212]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 02:58:27 149-210-165-102 sshd[14216]: Invalid user denis from 42.192.118.249 Apr 25 02:58:27 149-210-165-102 sshd[14217]: input_userauth_request: invalid user denis Apr 25 02:58:27 149-210-165-102 sshd[14216]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:27 149-210-165-102 sshd[14216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:58:28 149-210-165-102 sshd[14219]: Invalid user db2inst1 from 170.106.100.61 Apr 25 02:58:28 149-210-165-102 sshd[14220]: input_userauth_request: invalid user db2inst1 Apr 25 02:58:28 149-210-165-102 sshd[14219]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:28 149-210-165-102 sshd[14219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:58:29 149-210-165-102 sshd[14215]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:58:29 149-210-165-102 sshd[14215]: Invalid user sanjay from 186.206.157.74 Apr 25 02:58:29 149-210-165-102 sshd[14222]: input_userauth_request: invalid user sanjay Apr 25 02:58:29 149-210-165-102 sshd[14215]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:29 149-210-165-102 sshd[14215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:58:29 149-210-165-102 sshd[14221]: Invalid user ubuntu from 81.68.109.37 Apr 25 02:58:29 149-210-165-102 sshd[14223]: input_userauth_request: invalid user ubuntu Apr 25 02:58:29 149-210-165-102 sshd[14221]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:29 149-210-165-102 sshd[14221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 02:58:29 149-210-165-102 sshd[14216]: Failed password for invalid user denis from 42.192.118.249 port 44422 ssh2 Apr 25 02:58:30 149-210-165-102 sshd[14217]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:58:30 149-210-165-102 sshd[14219]: Failed password for invalid user db2inst1 from 170.106.100.61 port 53598 ssh2 Apr 25 02:58:30 149-210-165-102 sshd[14220]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:58:30 149-210-165-102 sshd[14215]: Failed password for invalid user sanjay from 186.206.157.74 port 24477 ssh2 Apr 25 02:58:31 149-210-165-102 sshd[14222]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 02:58:31 149-210-165-102 sshd[14221]: Failed password for invalid user ubuntu from 81.68.109.37 port 40726 ssh2 Apr 25 02:58:35 149-210-165-102 sshd[14223]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 02:58:42 149-210-165-102 sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 02:58:44 149-210-165-102 sshd[14228]: Failed password for root from 45.248.68.206 port 59078 ssh2 Apr 25 02:58:44 149-210-165-102 sshd[14233]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:58:44 149-210-165-102 sshd[14233]: Invalid user mills from 177.134.160.29 Apr 25 02:58:44 149-210-165-102 sshd[14234]: input_userauth_request: invalid user mills Apr 25 02:58:44 149-210-165-102 sshd[14233]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:44 149-210-165-102 sshd[14233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 02:58:45 149-210-165-102 sshd[14229]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 02:58:46 149-210-165-102 sshd[14233]: Failed password for invalid user mills from 177.134.160.29 port 52327 ssh2 Apr 25 02:58:46 149-210-165-102 sshd[14234]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 02:58:54 149-210-165-102 sshd[14232]: Connection closed by 121.5.166.237 Apr 25 02:58:54 149-210-165-102 sshd[14239]: Invalid user cuccia from 180.76.134.229 Apr 25 02:58:54 149-210-165-102 sshd[14240]: input_userauth_request: invalid user cuccia Apr 25 02:58:54 149-210-165-102 sshd[14239]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:54 149-210-165-102 sshd[14239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 02:58:56 149-210-165-102 sshd[14239]: Failed password for invalid user cuccia from 180.76.134.229 port 51530 ssh2 Apr 25 02:58:57 149-210-165-102 sshd[14240]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 02:58:59 149-210-165-102 sshd[14243]: Invalid user user1 from 42.193.54.22 Apr 25 02:58:59 149-210-165-102 sshd[14244]: input_userauth_request: invalid user user1 Apr 25 02:58:59 149-210-165-102 sshd[14243]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:58:59 149-210-165-102 sshd[14243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 02:59:01 149-210-165-102 sshd[14243]: Failed password for invalid user user1 from 42.193.54.22 port 32942 ssh2 Apr 25 02:59:02 149-210-165-102 sshd[14244]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 02:59:16 149-210-165-102 sshd[14251]: Invalid user duran from 152.136.122.126 Apr 25 02:59:16 149-210-165-102 sshd[14252]: input_userauth_request: invalid user duran Apr 25 02:59:16 149-210-165-102 sshd[14251]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:16 149-210-165-102 sshd[14251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 02:59:18 149-210-165-102 sshd[14251]: Failed password for invalid user duran from 152.136.122.126 port 16436 ssh2 Apr 25 02:59:18 149-210-165-102 sshd[14252]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 02:59:19 149-210-165-102 sshd[14256]: Invalid user user from 199.195.252.236 Apr 25 02:59:19 149-210-165-102 sshd[14257]: input_userauth_request: invalid user user Apr 25 02:59:19 149-210-165-102 sshd[14256]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:19 149-210-165-102 sshd[14256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 02:59:20 149-210-165-102 sshd[14256]: Failed password for invalid user user from 199.195.252.236 port 39424 ssh2 Apr 25 02:59:20 149-210-165-102 sshd[14257]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 02:59:21 149-210-165-102 sshd[14258]: Invalid user spark from 124.156.239.240 Apr 25 02:59:21 149-210-165-102 sshd[14259]: input_userauth_request: invalid user spark Apr 25 02:59:21 149-210-165-102 sshd[14258]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:21 149-210-165-102 sshd[14258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 02:59:23 149-210-165-102 sshd[14258]: Failed password for invalid user spark from 124.156.239.240 port 60788 ssh2 Apr 25 02:59:23 149-210-165-102 sshd[14259]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 02:59:37 149-210-165-102 sshd[14263]: Invalid user edi from 170.106.100.61 Apr 25 02:59:37 149-210-165-102 sshd[14264]: input_userauth_request: invalid user edi Apr 25 02:59:37 149-210-165-102 sshd[14263]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:37 149-210-165-102 sshd[14263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 02:59:37 149-210-165-102 sshd[14265]: Invalid user jt from 121.4.71.96 Apr 25 02:59:37 149-210-165-102 sshd[14266]: input_userauth_request: invalid user jt Apr 25 02:59:37 149-210-165-102 sshd[14265]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:37 149-210-165-102 sshd[14265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 02:59:38 149-210-165-102 sshd[14263]: Failed password for invalid user edi from 170.106.100.61 port 45156 ssh2 Apr 25 02:59:38 149-210-165-102 sshd[14264]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 02:59:39 149-210-165-102 sshd[14265]: Failed password for invalid user jt from 121.4.71.96 port 46552 ssh2 Apr 25 02:59:39 149-210-165-102 sshd[14266]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 02:59:44 149-210-165-102 sshd[14271]: Invalid user super from 42.192.118.249 Apr 25 02:59:44 149-210-165-102 sshd[14272]: input_userauth_request: invalid user super Apr 25 02:59:44 149-210-165-102 sshd[14271]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:44 149-210-165-102 sshd[14271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 02:59:46 149-210-165-102 sshd[14269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=root Apr 25 02:59:46 149-210-165-102 sshd[14271]: Failed password for invalid user super from 42.192.118.249 port 35690 ssh2 Apr 25 02:59:47 149-210-165-102 sshd[14272]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 02:59:47 149-210-165-102 sshd[14273]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:59:47 149-210-165-102 sshd[14273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 user=root Apr 25 02:59:48 149-210-165-102 sshd[14269]: Failed password for root from 47.254.179.224 port 35538 ssh2 Apr 25 02:59:48 149-210-165-102 sshd[14270]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 02:59:49 149-210-165-102 sshd[14273]: Failed password for root from 103.118.42.205 port 38958 ssh2 Apr 25 02:59:49 149-210-165-102 sshd[14274]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 02:59:52 149-210-165-102 sshd[14277]: Invalid user izak from 154.8.233.56 Apr 25 02:59:52 149-210-165-102 sshd[14278]: input_userauth_request: invalid user izak Apr 25 02:59:52 149-210-165-102 sshd[14277]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:52 149-210-165-102 sshd[14277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 02:59:53 149-210-165-102 sshd[14279]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 02:59:53 149-210-165-102 sshd[14279]: Invalid user ross from 186.206.157.74 Apr 25 02:59:53 149-210-165-102 sshd[14280]: input_userauth_request: invalid user ross Apr 25 02:59:53 149-210-165-102 sshd[14279]: pam_unix(sshd:auth): check pass; user unknown Apr 25 02:59:53 149-210-165-102 sshd[14279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 02:59:54 149-210-165-102 sshd[14277]: Failed password for invalid user izak from 154.8.233.56 port 60870 ssh2 Apr 25 02:59:54 149-210-165-102 sshd[14278]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 02:59:56 149-210-165-102 sshd[14279]: Failed password for invalid user ross from 186.206.157.74 port 53576 ssh2 Apr 25 02:59:56 149-210-165-102 sshd[14280]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:00:20 149-210-165-102 sshd[14322]: Invalid user bots from 152.136.122.126 Apr 25 03:00:20 149-210-165-102 sshd[14324]: input_userauth_request: invalid user bots Apr 25 03:00:20 149-210-165-102 sshd[14322]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:20 149-210-165-102 sshd[14322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 03:00:22 149-210-165-102 sshd[14322]: Failed password for invalid user bots from 152.136.122.126 port 30972 ssh2 Apr 25 03:00:22 149-210-165-102 sshd[14324]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:00:27 149-210-165-102 sshd[14330]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:00:27 149-210-165-102 sshd[14330]: Invalid user g from 186.210.115.15 Apr 25 03:00:27 149-210-165-102 sshd[14331]: input_userauth_request: invalid user g Apr 25 03:00:27 149-210-165-102 sshd[14330]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:27 149-210-165-102 sshd[14330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 03:00:29 149-210-165-102 sshd[14330]: Failed password for invalid user g from 186.210.115.15 port 40186 ssh2 Apr 25 03:00:30 149-210-165-102 sshd[14331]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 03:00:35 149-210-165-102 sshd[14337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 user=ftp Apr 25 03:00:37 149-210-165-102 sshd[14337]: Failed password for ftp from 42.193.54.22 port 57332 ssh2 Apr 25 03:00:37 149-210-165-102 sshd[14338]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 03:00:39 149-210-165-102 sshd[14339]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:00:39 149-210-165-102 sshd[14339]: Invalid user ls from 122.252.231.138 Apr 25 03:00:39 149-210-165-102 sshd[14340]: input_userauth_request: invalid user ls Apr 25 03:00:39 149-210-165-102 sshd[14339]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:39 149-210-165-102 sshd[14339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 03:00:40 149-210-165-102 sshd[14334]: Invalid user ayub from 150.109.252.206 Apr 25 03:00:40 149-210-165-102 sshd[14335]: input_userauth_request: invalid user ayub Apr 25 03:00:40 149-210-165-102 sshd[14334]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:40 149-210-165-102 sshd[14334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 Apr 25 03:00:41 149-210-165-102 sshd[14339]: Failed password for invalid user ls from 122.252.231.138 port 50010 ssh2 Apr 25 03:00:41 149-210-165-102 sshd[14340]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 03:00:42 149-210-165-102 sshd[14334]: Failed password for invalid user ayub from 150.109.252.206 port 35550 ssh2 Apr 25 03:00:42 149-210-165-102 sshd[14335]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 03:00:45 149-210-165-102 sshd[14347]: Invalid user pp from 170.106.100.61 Apr 25 03:00:45 149-210-165-102 sshd[14348]: input_userauth_request: invalid user pp Apr 25 03:00:45 149-210-165-102 sshd[14347]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:45 149-210-165-102 sshd[14347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 03:00:46 149-210-165-102 sshd[14345]: Invalid user tim from 178.128.210.45 Apr 25 03:00:46 149-210-165-102 sshd[14346]: input_userauth_request: invalid user tim Apr 25 03:00:46 149-210-165-102 sshd[14345]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:46 149-210-165-102 sshd[14345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 03:00:47 149-210-165-102 sshd[14349]: Invalid user lebesgue from 121.5.23.61 Apr 25 03:00:47 149-210-165-102 sshd[14350]: input_userauth_request: invalid user lebesgue Apr 25 03:00:47 149-210-165-102 sshd[14349]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:47 149-210-165-102 sshd[14349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 03:00:47 149-210-165-102 sshd[14347]: Failed password for invalid user pp from 170.106.100.61 port 36700 ssh2 Apr 25 03:00:47 149-210-165-102 sshd[14348]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:00:48 149-210-165-102 sshd[14345]: Failed password for invalid user tim from 178.128.210.45 port 59668 ssh2 Apr 25 03:00:49 149-210-165-102 sshd[14349]: Failed password for invalid user lebesgue from 121.5.23.61 port 55332 ssh2 Apr 25 03:00:49 149-210-165-102 sshd[14350]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 03:00:49 149-210-165-102 sshd[14346]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 03:00:53 149-210-165-102 sshd[14355]: Invalid user ems from 140.143.230.41 Apr 25 03:00:53 149-210-165-102 sshd[14356]: input_userauth_request: invalid user ems Apr 25 03:00:53 149-210-165-102 sshd[14355]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:00:53 149-210-165-102 sshd[14355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 03:00:55 149-210-165-102 sshd[14357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 user=root Apr 25 03:00:56 149-210-165-102 sshd[14355]: Failed password for invalid user ems from 140.143.230.41 port 57950 ssh2 Apr 25 03:00:56 149-210-165-102 sshd[14356]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 03:00:56 149-210-165-102 sshd[14357]: Failed password for root from 45.248.68.206 port 57508 ssh2 Apr 25 03:00:57 149-210-165-102 sshd[14358]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 03:01:05 149-210-165-102 sshd[14377]: Invalid user elsearch from 42.192.118.249 Apr 25 03:01:05 149-210-165-102 sshd[14378]: input_userauth_request: invalid user elsearch Apr 25 03:01:05 149-210-165-102 sshd[14377]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:05 149-210-165-102 sshd[14377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 03:01:07 149-210-165-102 sshd[14377]: Failed password for invalid user elsearch from 42.192.118.249 port 55194 ssh2 Apr 25 03:01:07 149-210-165-102 sshd[14378]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 03:01:12 149-210-165-102 sshd[14380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 user=root Apr 25 03:01:14 149-210-165-102 sshd[14380]: Failed password for root from 199.195.252.236 port 44306 ssh2 Apr 25 03:01:14 149-210-165-102 sshd[14381]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 03:01:16 149-210-165-102 sshd[14382]: Invalid user newton from 119.28.61.47 Apr 25 03:01:16 149-210-165-102 sshd[14383]: input_userauth_request: invalid user newton Apr 25 03:01:16 149-210-165-102 sshd[14382]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:16 149-210-165-102 sshd[14382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 03:01:16 149-210-165-102 sshd[14385]: Invalid user victor from 180.76.134.229 Apr 25 03:01:16 149-210-165-102 sshd[14388]: input_userauth_request: invalid user victor Apr 25 03:01:16 149-210-165-102 sshd[14385]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:16 149-210-165-102 sshd[14385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 03:01:18 149-210-165-102 sshd[14382]: Failed password for invalid user newton from 119.28.61.47 port 52390 ssh2 Apr 25 03:01:18 149-210-165-102 sshd[14383]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 03:01:19 149-210-165-102 sshd[14385]: Failed password for invalid user victor from 180.76.134.229 port 56160 ssh2 Apr 25 03:01:19 149-210-165-102 sshd[14392]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:01:19 149-210-165-102 sshd[14392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 user=root Apr 25 03:01:20 149-210-165-102 sshd[14388]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 03:01:21 149-210-165-102 sshd[14392]: Failed password for root from 186.206.157.74 port 11660 ssh2 Apr 25 03:01:21 149-210-165-102 sshd[14394]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:01:24 149-210-165-102 sshd[14404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 03:01:26 149-210-165-102 sshd[14404]: Failed password for root from 152.136.122.126 port 45478 ssh2 Apr 25 03:01:26 149-210-165-102 sshd[14407]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:01:33 149-210-165-102 sshd[14393]: Connection closed by 81.68.109.37 Apr 25 03:01:34 149-210-165-102 sshd[14410]: Invalid user tmp from 121.4.71.96 Apr 25 03:01:34 149-210-165-102 sshd[14411]: input_userauth_request: invalid user tmp Apr 25 03:01:34 149-210-165-102 sshd[14410]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:34 149-210-165-102 sshd[14410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 03:01:36 149-210-165-102 sshd[14415]: Invalid user jimmy from 124.156.239.240 Apr 25 03:01:36 149-210-165-102 sshd[14416]: input_userauth_request: invalid user jimmy Apr 25 03:01:36 149-210-165-102 sshd[14415]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:36 149-210-165-102 sshd[14415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 03:01:36 149-210-165-102 sshd[14410]: Failed password for invalid user tmp from 121.4.71.96 port 40832 ssh2 Apr 25 03:01:36 149-210-165-102 sshd[14411]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 03:01:37 149-210-165-102 sshd[14415]: Failed password for invalid user jimmy from 124.156.239.240 port 41518 ssh2 Apr 25 03:01:38 149-210-165-102 sshd[14416]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 03:01:55 149-210-165-102 sshd[14423]: Invalid user jamesm from 170.106.100.61 Apr 25 03:01:55 149-210-165-102 sshd[14424]: input_userauth_request: invalid user jamesm Apr 25 03:01:55 149-210-165-102 sshd[14423]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:01:55 149-210-165-102 sshd[14423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 03:01:57 149-210-165-102 sshd[14423]: Failed password for invalid user jamesm from 170.106.100.61 port 56478 ssh2 Apr 25 03:01:57 149-210-165-102 sshd[14424]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:02:08 149-210-165-102 sshd[14433]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:02:08 149-210-165-102 sshd[14433]: Invalid user bert from 103.118.42.205 Apr 25 03:02:08 149-210-165-102 sshd[14434]: input_userauth_request: invalid user bert Apr 25 03:02:08 149-210-165-102 sshd[14433]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:08 149-210-165-102 sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 03:02:10 149-210-165-102 sshd[14433]: Failed password for invalid user bert from 103.118.42.205 port 57136 ssh2 Apr 25 03:02:10 149-210-165-102 sshd[14434]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 03:02:13 149-210-165-102 sshd[14442]: Invalid user trinity from 121.5.166.237 Apr 25 03:02:13 149-210-165-102 sshd[14443]: input_userauth_request: invalid user trinity Apr 25 03:02:13 149-210-165-102 sshd[14442]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:13 149-210-165-102 sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 03:02:16 149-210-165-102 sshd[14442]: Failed password for invalid user trinity from 121.5.166.237 port 33514 ssh2 Apr 25 03:02:16 149-210-165-102 sshd[14443]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 03:02:17 149-210-165-102 sshd[14447]: Invalid user alimov from 154.8.233.56 Apr 25 03:02:17 149-210-165-102 sshd[14448]: input_userauth_request: invalid user alimov Apr 25 03:02:17 149-210-165-102 sshd[14447]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:17 149-210-165-102 sshd[14447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 03:02:19 149-210-165-102 sshd[14447]: Failed password for invalid user alimov from 154.8.233.56 port 34170 ssh2 Apr 25 03:02:20 149-210-165-102 sshd[14448]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 03:02:20 149-210-165-102 sshd[14452]: Invalid user guo from 42.193.54.22 Apr 25 03:02:20 149-210-165-102 sshd[14453]: input_userauth_request: invalid user guo Apr 25 03:02:20 149-210-165-102 sshd[14452]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:20 149-210-165-102 sshd[14452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 03:02:21 149-210-165-102 sshd[14454]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:02:21 149-210-165-102 sshd[14454]: Invalid user mongodb from 177.134.160.29 Apr 25 03:02:21 149-210-165-102 sshd[14457]: input_userauth_request: invalid user mongodb Apr 25 03:02:21 149-210-165-102 sshd[14454]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:21 149-210-165-102 sshd[14454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 03:02:21 149-210-165-102 sshd[14452]: Failed password for invalid user guo from 42.193.54.22 port 53526 ssh2 Apr 25 03:02:22 149-210-165-102 sshd[14453]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 03:02:23 149-210-165-102 sshd[14459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 user=root Apr 25 03:02:23 149-210-165-102 sshd[14454]: Failed password for invalid user mongodb from 177.134.160.29 port 43600 ssh2 Apr 25 03:02:24 149-210-165-102 sshd[14457]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 03:02:24 149-210-165-102 sshd[14461]: Invalid user gustav from 42.192.118.249 Apr 25 03:02:24 149-210-165-102 sshd[14462]: input_userauth_request: invalid user gustav Apr 25 03:02:24 149-210-165-102 sshd[14461]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:24 149-210-165-102 sshd[14461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 03:02:25 149-210-165-102 sshd[14459]: Failed password for root from 152.136.122.126 port 59986 ssh2 Apr 25 03:02:25 149-210-165-102 sshd[14460]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:02:26 149-210-165-102 sshd[14461]: Failed password for invalid user gustav from 42.192.118.249 port 46462 ssh2 Apr 25 03:02:26 149-210-165-102 sshd[14462]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 03:02:35 149-210-165-102 sshd[14465]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:02:35 149-210-165-102 sshd[14465]: Invalid user ardi from 186.210.115.15 Apr 25 03:02:35 149-210-165-102 sshd[14466]: input_userauth_request: invalid user ardi Apr 25 03:02:35 149-210-165-102 sshd[14465]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:35 149-210-165-102 sshd[14465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 03:02:38 149-210-165-102 sshd[14465]: Failed password for invalid user ardi from 186.210.115.15 port 42698 ssh2 Apr 25 03:02:38 149-210-165-102 sshd[14466]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 03:02:44 149-210-165-102 sshd[14470]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:02:44 149-210-165-102 sshd[14470]: Invalid user chris from 186.206.157.74 Apr 25 03:02:44 149-210-165-102 sshd[14471]: input_userauth_request: invalid user chris Apr 25 03:02:44 149-210-165-102 sshd[14470]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:44 149-210-165-102 sshd[14470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 03:02:46 149-210-165-102 sshd[14470]: Failed password for invalid user chris from 186.206.157.74 port 61630 ssh2 Apr 25 03:02:46 149-210-165-102 sshd[14471]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:02:54 149-210-165-102 sshd[14473]: Invalid user zhang from 47.254.179.224 Apr 25 03:02:54 149-210-165-102 sshd[14474]: input_userauth_request: invalid user zhang Apr 25 03:02:54 149-210-165-102 sshd[14473]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:54 149-210-165-102 sshd[14473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 Apr 25 03:02:56 149-210-165-102 sshd[14473]: Failed password for invalid user zhang from 47.254.179.224 port 46450 ssh2 Apr 25 03:02:56 149-210-165-102 sshd[14474]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 03:02:59 149-210-165-102 sshd[14476]: Invalid user sistemas from 178.128.210.45 Apr 25 03:02:59 149-210-165-102 sshd[14477]: input_userauth_request: invalid user sistemas Apr 25 03:02:59 149-210-165-102 sshd[14476]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:02:59 149-210-165-102 sshd[14476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 03:03:01 149-210-165-102 sshd[14476]: Failed password for invalid user sistemas from 178.128.210.45 port 33260 ssh2 Apr 25 03:03:01 149-210-165-102 sshd[14477]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 03:03:05 149-210-165-102 sshd[14480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 user=root Apr 25 03:03:06 149-210-165-102 sshd[14482]: Invalid user marie from 199.195.252.236 Apr 25 03:03:06 149-210-165-102 sshd[14483]: input_userauth_request: invalid user marie Apr 25 03:03:06 149-210-165-102 sshd[14482]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:03:06 149-210-165-102 sshd[14482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 03:03:07 149-210-165-102 sshd[14482]: Failed password for invalid user marie from 199.195.252.236 port 49192 ssh2 Apr 25 03:03:08 149-210-165-102 sshd[14483]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 03:03:08 149-210-165-102 sshd[14480]: Failed password for root from 170.106.100.61 port 48038 ssh2 Apr 25 03:03:08 149-210-165-102 sshd[14481]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:03:16 149-210-165-102 sshd[14492]: Did not receive identification string from 45.248.68.206 Apr 25 03:03:28 149-210-165-102 sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 user=root Apr 25 03:03:28 149-210-165-102 sshd[14494]: Connection closed by 152.136.122.126 Apr 25 03:03:30 149-210-165-102 sshd[14502]: Failed password for root from 121.4.71.96 port 35112 ssh2 Apr 25 03:03:30 149-210-165-102 sshd[14503]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 03:03:36 149-210-165-102 sshd[14513]: Invalid user fafa from 180.76.134.229 Apr 25 03:03:36 149-210-165-102 sshd[14515]: input_userauth_request: invalid user fafa Apr 25 03:03:36 149-210-165-102 sshd[14513]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:03:36 149-210-165-102 sshd[14513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 Apr 25 03:03:38 149-210-165-102 sshd[14513]: Failed password for invalid user fafa from 180.76.134.229 port 60796 ssh2 Apr 25 03:03:38 149-210-165-102 sshd[14515]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 03:03:39 149-210-165-102 sshd[14511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.140.161 user=root Apr 25 03:03:41 149-210-165-102 sshd[14511]: Failed password for root from 129.146.140.161 port 35100 ssh2 Apr 25 03:03:42 149-210-165-102 sshd[14512]: Received disconnect from 129.146.140.161: 11: Bye Bye Apr 25 03:03:42 149-210-165-102 sshd[14517]: Invalid user ascension from 42.192.118.249 Apr 25 03:03:42 149-210-165-102 sshd[14518]: input_userauth_request: invalid user ascension Apr 25 03:03:42 149-210-165-102 sshd[14517]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:03:42 149-210-165-102 sshd[14517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 03:03:44 149-210-165-102 sshd[14517]: Failed password for invalid user ascension from 42.192.118.249 port 37728 ssh2 Apr 25 03:03:44 149-210-165-102 sshd[14518]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 03:03:55 149-210-165-102 sshd[14524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 user=root Apr 25 03:03:56 149-210-165-102 sshd[14524]: Failed password for root from 124.156.239.240 port 50486 ssh2 Apr 25 03:03:57 149-210-165-102 sshd[14525]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 03:03:58 149-210-165-102 sshd[14530]: Invalid user hacker from 42.193.54.22 Apr 25 03:03:58 149-210-165-102 sshd[14531]: input_userauth_request: invalid user hacker Apr 25 03:03:58 149-210-165-102 sshd[14530]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:03:58 149-210-165-102 sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 03:03:58 149-210-165-102 sshd[14532]: Invalid user oracle1 from 42.192.76.28 Apr 25 03:03:58 149-210-165-102 sshd[14533]: input_userauth_request: invalid user oracle1 Apr 25 03:03:58 149-210-165-102 sshd[14532]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:03:58 149-210-165-102 sshd[14532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.76.28 Apr 25 03:04:01 149-210-165-102 sshd[14530]: Failed password for invalid user hacker from 42.193.54.22 port 49708 ssh2 Apr 25 03:04:01 149-210-165-102 sshd[14532]: Failed password for invalid user oracle1 from 42.192.76.28 port 53654 ssh2 Apr 25 03:04:01 149-210-165-102 sshd[14531]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 03:04:01 149-210-165-102 sshd[14533]: Received disconnect from 42.192.76.28: 11: Bye Bye Apr 25 03:04:09 149-210-165-102 sshd[14547]: Invalid user transfer from 81.68.109.37 Apr 25 03:04:09 149-210-165-102 sshd[14548]: input_userauth_request: invalid user transfer Apr 25 03:04:09 149-210-165-102 sshd[14547]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:09 149-210-165-102 sshd[14547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 Apr 25 03:04:11 149-210-165-102 sshd[14549]: reverse mapping checking getaddrinfo for ws138-231-252-122.rcil.gov.in [122.252.231.138] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:04:11 149-210-165-102 sshd[14549]: Invalid user zxin10 from 122.252.231.138 Apr 25 03:04:11 149-210-165-102 sshd[14550]: input_userauth_request: invalid user zxin10 Apr 25 03:04:11 149-210-165-102 sshd[14549]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:11 149-210-165-102 sshd[14549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.231.138 Apr 25 03:04:11 149-210-165-102 sshd[14547]: Failed password for invalid user transfer from 81.68.109.37 port 48548 ssh2 Apr 25 03:04:12 149-210-165-102 sshd[14548]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 03:04:13 149-210-165-102 sshd[14549]: Failed password for invalid user zxin10 from 122.252.231.138 port 48790 ssh2 Apr 25 03:04:13 149-210-165-102 sshd[14550]: Received disconnect from 122.252.231.138: 11: Bye Bye Apr 25 03:04:15 149-210-165-102 sshd[14552]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:04:15 149-210-165-102 sshd[14552]: Invalid user testmail from 186.206.157.74 Apr 25 03:04:15 149-210-165-102 sshd[14554]: input_userauth_request: invalid user testmail Apr 25 03:04:15 149-210-165-102 sshd[14552]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:15 149-210-165-102 sshd[14552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 03:04:15 149-210-165-102 sshd[14555]: Invalid user justine from 121.5.23.61 Apr 25 03:04:15 149-210-165-102 sshd[14556]: input_userauth_request: invalid user justine Apr 25 03:04:15 149-210-165-102 sshd[14555]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:15 149-210-165-102 sshd[14555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.23.61 Apr 25 03:04:16 149-210-165-102 sshd[14557]: Invalid user ftp_user from 170.106.100.61 Apr 25 03:04:16 149-210-165-102 sshd[14558]: input_userauth_request: invalid user ftp_user Apr 25 03:04:16 149-210-165-102 sshd[14557]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:16 149-210-165-102 sshd[14557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 03:04:16 149-210-165-102 sshd[14559]: Invalid user th from 152.136.122.126 Apr 25 03:04:16 149-210-165-102 sshd[14560]: input_userauth_request: invalid user th Apr 25 03:04:16 149-210-165-102 sshd[14559]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:16 149-210-165-102 sshd[14559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 03:04:17 149-210-165-102 sshd[14552]: Failed password for invalid user testmail from 186.206.157.74 port 6465 ssh2 Apr 25 03:04:17 149-210-165-102 sshd[14555]: Failed password for invalid user justine from 121.5.23.61 port 36104 ssh2 Apr 25 03:04:17 149-210-165-102 sshd[14556]: Received disconnect from 121.5.23.61: 11: Bye Bye Apr 25 03:04:17 149-210-165-102 sshd[14557]: Failed password for invalid user ftp_user from 170.106.100.61 port 39590 ssh2 Apr 25 03:04:18 149-210-165-102 sshd[14558]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:04:18 149-210-165-102 sshd[14559]: Failed password for invalid user th from 152.136.122.126 port 25038 ssh2 Apr 25 03:04:20 149-210-165-102 sshd[14554]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:04:21 149-210-165-102 sshd[14560]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:04:30 149-210-165-102 sshd[14573]: Invalid user ab from 140.143.230.41 Apr 25 03:04:30 149-210-165-102 sshd[14577]: input_userauth_request: invalid user ab Apr 25 03:04:30 149-210-165-102 sshd[14573]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:30 149-210-165-102 sshd[14573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.41 Apr 25 03:04:31 149-210-165-102 sshd[14575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.252.206 user=root Apr 25 03:04:32 149-210-165-102 sshd[14573]: Failed password for invalid user ab from 140.143.230.41 port 40436 ssh2 Apr 25 03:04:32 149-210-165-102 sshd[14577]: Received disconnect from 140.143.230.41: 11: Bye Bye Apr 25 03:04:33 149-210-165-102 sshd[14575]: Failed password for root from 150.109.252.206 port 37596 ssh2 Apr 25 03:04:33 149-210-165-102 sshd[14576]: Received disconnect from 150.109.252.206: 11: Bye Bye Apr 25 03:04:34 149-210-165-102 sshd[14578]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:04:34 149-210-165-102 sshd[14578]: Invalid user build from 103.118.42.205 Apr 25 03:04:34 149-210-165-102 sshd[14579]: input_userauth_request: invalid user build Apr 25 03:04:34 149-210-165-102 sshd[14578]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:34 149-210-165-102 sshd[14578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 03:04:34 149-210-165-102 sshd[14571]: Invalid user backupftp from 119.28.61.47 Apr 25 03:04:34 149-210-165-102 sshd[14572]: input_userauth_request: invalid user backupftp Apr 25 03:04:34 149-210-165-102 sshd[14571]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:34 149-210-165-102 sshd[14571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.61.47 Apr 25 03:04:36 149-210-165-102 sshd[14578]: Failed password for invalid user build from 103.118.42.205 port 47318 ssh2 Apr 25 03:04:36 149-210-165-102 sshd[14571]: Failed password for invalid user backupftp from 119.28.61.47 port 49076 ssh2 Apr 25 03:04:36 149-210-165-102 sshd[14572]: Received disconnect from 119.28.61.47: 11: Bye Bye Apr 25 03:04:38 149-210-165-102 sshd[14579]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 03:04:42 149-210-165-102 sshd[14583]: Invalid user webmaster from 154.8.233.56 Apr 25 03:04:42 149-210-165-102 sshd[14584]: input_userauth_request: invalid user webmaster Apr 25 03:04:42 149-210-165-102 sshd[14583]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:42 149-210-165-102 sshd[14583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 03:04:43 149-210-165-102 sshd[14583]: Failed password for invalid user webmaster from 154.8.233.56 port 35702 ssh2 Apr 25 03:04:44 149-210-165-102 sshd[14584]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 03:04:45 149-210-165-102 sshd[14587]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:04:45 149-210-165-102 sshd[14587]: Invalid user gk from 186.210.115.15 Apr 25 03:04:45 149-210-165-102 sshd[14588]: input_userauth_request: invalid user gk Apr 25 03:04:45 149-210-165-102 sshd[14587]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:45 149-210-165-102 sshd[14587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 03:04:47 149-210-165-102 sshd[14587]: Failed password for invalid user gk from 186.210.115.15 port 45212 ssh2 Apr 25 03:04:48 149-210-165-102 sshd[14588]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 03:04:57 149-210-165-102 sshd[14593]: Invalid user veronica from 199.195.252.236 Apr 25 03:04:57 149-210-165-102 sshd[14594]: input_userauth_request: invalid user veronica Apr 25 03:04:57 149-210-165-102 sshd[14593]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:04:57 149-210-165-102 sshd[14593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 03:04:59 149-210-165-102 sshd[14593]: Failed password for invalid user veronica from 199.195.252.236 port 54074 ssh2 Apr 25 03:04:59 149-210-165-102 sshd[14594]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 03:05:00 149-210-165-102 sshd[14595]: Invalid user alfredo from 42.192.118.249 Apr 25 03:05:00 149-210-165-102 sshd[14596]: input_userauth_request: invalid user alfredo Apr 25 03:05:00 149-210-165-102 sshd[14595]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:00 149-210-165-102 sshd[14595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 03:05:02 149-210-165-102 sshd[14595]: Failed password for invalid user alfredo from 42.192.118.249 port 57240 ssh2 Apr 25 03:05:02 149-210-165-102 sshd[14596]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 03:05:14 149-210-165-102 sshd[14608]: Invalid user administrator from 152.136.122.126 Apr 25 03:05:14 149-210-165-102 sshd[14609]: input_userauth_request: invalid user administrator Apr 25 03:05:14 149-210-165-102 sshd[14608]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:14 149-210-165-102 sshd[14608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 03:05:15 149-210-165-102 sshd[14608]: Failed password for invalid user administrator from 152.136.122.126 port 39558 ssh2 Apr 25 03:05:16 149-210-165-102 sshd[14609]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:05:23 149-210-165-102 sshd[14620]: Invalid user admin from 170.106.100.61 Apr 25 03:05:23 149-210-165-102 sshd[14621]: input_userauth_request: invalid user admin Apr 25 03:05:23 149-210-165-102 sshd[14620]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:23 149-210-165-102 sshd[14620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 03:05:24 149-210-165-102 sshd[14616]: Invalid user admin from 45.248.68.206 Apr 25 03:05:24 149-210-165-102 sshd[14617]: input_userauth_request: invalid user admin Apr 25 03:05:24 149-210-165-102 sshd[14616]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:24 149-210-165-102 sshd[14616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.68.206 Apr 25 03:05:24 149-210-165-102 sshd[14618]: Invalid user test from 121.4.71.96 Apr 25 03:05:24 149-210-165-102 sshd[14619]: input_userauth_request: invalid user test Apr 25 03:05:24 149-210-165-102 sshd[14618]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:24 149-210-165-102 sshd[14618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.71.96 Apr 25 03:05:25 149-210-165-102 sshd[14614]: Invalid user chandra from 178.128.210.45 Apr 25 03:05:25 149-210-165-102 sshd[14615]: input_userauth_request: invalid user chandra Apr 25 03:05:25 149-210-165-102 sshd[14614]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:25 149-210-165-102 sshd[14614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.210.45 Apr 25 03:05:25 149-210-165-102 sshd[14620]: Failed password for invalid user admin from 170.106.100.61 port 59370 ssh2 Apr 25 03:05:26 149-210-165-102 sshd[14616]: Failed password for invalid user admin from 45.248.68.206 port 54380 ssh2 Apr 25 03:05:26 149-210-165-102 sshd[14621]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:05:26 149-210-165-102 sshd[14618]: Failed password for invalid user test from 121.4.71.96 port 57620 ssh2 Apr 25 03:05:26 149-210-165-102 sshd[14619]: Received disconnect from 121.4.71.96: 11: Bye Bye Apr 25 03:05:27 149-210-165-102 sshd[14614]: Failed password for invalid user chandra from 178.128.210.45 port 35084 ssh2 Apr 25 03:05:27 149-210-165-102 sshd[14617]: Received disconnect from 45.248.68.206: 11: Bye Bye Apr 25 03:05:27 149-210-165-102 sshd[14615]: Received disconnect from 178.128.210.45: 11: Bye Bye Apr 25 03:05:35 149-210-165-102 sshd[14628]: Invalid user alex from 42.193.54.22 Apr 25 03:05:35 149-210-165-102 sshd[14629]: input_userauth_request: invalid user alex Apr 25 03:05:35 149-210-165-102 sshd[14628]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:35 149-210-165-102 sshd[14628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 03:05:37 149-210-165-102 sshd[14628]: Failed password for invalid user alex from 42.193.54.22 port 45866 ssh2 Apr 25 03:05:38 149-210-165-102 sshd[14629]: Received disconnect from 42.193.54.22: 11: Bye Bye Apr 25 03:05:40 149-210-165-102 sshd[14631]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:05:40 149-210-165-102 sshd[14631]: Invalid user training from 186.206.157.74 Apr 25 03:05:40 149-210-165-102 sshd[14632]: input_userauth_request: invalid user training Apr 25 03:05:40 149-210-165-102 sshd[14631]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:40 149-210-165-102 sshd[14631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 03:05:42 149-210-165-102 sshd[14631]: Failed password for invalid user training from 186.206.157.74 port 7767 ssh2 Apr 25 03:05:42 149-210-165-102 sshd[14632]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:05:43 149-210-165-102 sshd[14634]: Invalid user miao from 121.5.166.237 Apr 25 03:05:43 149-210-165-102 sshd[14637]: input_userauth_request: invalid user miao Apr 25 03:05:43 149-210-165-102 sshd[14634]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:05:43 149-210-165-102 sshd[14634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.5.166.237 Apr 25 03:05:45 149-210-165-102 sshd[14634]: Failed password for invalid user miao from 121.5.166.237 port 41620 ssh2 Apr 25 03:05:46 149-210-165-102 sshd[14637]: Received disconnect from 121.5.166.237: 11: Bye Bye Apr 25 03:05:50 149-210-165-102 sshd[14640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.229 user=root Apr 25 03:05:52 149-210-165-102 sshd[14640]: Failed password for root from 180.76.134.229 port 37216 ssh2 Apr 25 03:05:52 149-210-165-102 sshd[14641]: Received disconnect from 180.76.134.229: 11: Bye Bye Apr 25 03:05:58 149-210-165-102 sshd[14645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.179.224 user=root Apr 25 03:06:00 149-210-165-102 sshd[14645]: Failed password for root from 47.254.179.224 port 57344 ssh2 Apr 25 03:06:00 149-210-165-102 sshd[14646]: Received disconnect from 47.254.179.224: 11: Bye Bye Apr 25 03:06:02 149-210-165-102 sshd[14648]: reverse mapping checking getaddrinfo for 177.134.160.29.dynamic.adsl.gvt.net.br [177.134.160.29] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:06:02 149-210-165-102 sshd[14648]: Invalid user times from 177.134.160.29 Apr 25 03:06:02 149-210-165-102 sshd[14649]: input_userauth_request: invalid user times Apr 25 03:06:02 149-210-165-102 sshd[14648]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:02 149-210-165-102 sshd[14648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.134.160.29 Apr 25 03:06:03 149-210-165-102 sshd[14648]: Failed password for invalid user times from 177.134.160.29 port 34891 ssh2 Apr 25 03:06:03 149-210-165-102 sshd[14649]: Received disconnect from 177.134.160.29: 11: Bye Bye Apr 25 03:06:09 149-210-165-102 sshd[14651]: Invalid user michele from 124.156.239.240 Apr 25 03:06:09 149-210-165-102 sshd[14653]: input_userauth_request: invalid user michele Apr 25 03:06:09 149-210-165-102 sshd[14651]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:09 149-210-165-102 sshd[14651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.239.240 Apr 25 03:06:10 149-210-165-102 sshd[14651]: Failed password for invalid user michele from 124.156.239.240 port 59450 ssh2 Apr 25 03:06:11 149-210-165-102 sshd[14653]: Received disconnect from 124.156.239.240: 11: Bye Bye Apr 25 03:06:11 149-210-165-102 sshd[14652]: Invalid user server from 152.136.122.126 Apr 25 03:06:11 149-210-165-102 sshd[14654]: input_userauth_request: invalid user server Apr 25 03:06:11 149-210-165-102 sshd[14652]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:11 149-210-165-102 sshd[14652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.126 Apr 25 03:06:12 149-210-165-102 sshd[14652]: Failed password for invalid user server from 152.136.122.126 port 54072 ssh2 Apr 25 03:06:13 149-210-165-102 sshd[14654]: Received disconnect from 152.136.122.126: 11: Bye Bye Apr 25 03:06:16 149-210-165-102 sshd[14656]: Invalid user rafal from 42.192.118.249 Apr 25 03:06:16 149-210-165-102 sshd[14657]: input_userauth_request: invalid user rafal Apr 25 03:06:16 149-210-165-102 sshd[14656]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:16 149-210-165-102 sshd[14656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.192.118.249 Apr 25 03:06:18 149-210-165-102 sshd[14656]: Failed password for invalid user rafal from 42.192.118.249 port 48504 ssh2 Apr 25 03:06:18 149-210-165-102 sshd[14657]: Received disconnect from 42.192.118.249: 11: Bye Bye Apr 25 03:06:31 149-210-165-102 sshd[14666]: Invalid user m from 170.106.100.61 Apr 25 03:06:31 149-210-165-102 sshd[14667]: input_userauth_request: invalid user m Apr 25 03:06:31 149-210-165-102 sshd[14666]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:31 149-210-165-102 sshd[14666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.100.61 Apr 25 03:06:32 149-210-165-102 sshd[14666]: Failed password for invalid user m from 170.106.100.61 port 50918 ssh2 Apr 25 03:06:33 149-210-165-102 sshd[14667]: Received disconnect from 170.106.100.61: 11: Bye Bye Apr 25 03:06:44 149-210-165-102 sshd[14676]: Invalid user viper from 199.195.252.236 Apr 25 03:06:44 149-210-165-102 sshd[14677]: input_userauth_request: invalid user viper Apr 25 03:06:44 149-210-165-102 sshd[14676]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:44 149-210-165-102 sshd[14676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.236 Apr 25 03:06:46 149-210-165-102 sshd[14676]: Failed password for invalid user viper from 199.195.252.236 port 58956 ssh2 Apr 25 03:06:46 149-210-165-102 sshd[14677]: Received disconnect from 199.195.252.236: 11: Bye Bye Apr 25 03:06:52 149-210-165-102 sshd[14682]: Address 103.118.42.205 maps to 103.118.42.205.static.clayer.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:06:52 149-210-165-102 sshd[14682]: Invalid user chandra from 103.118.42.205 Apr 25 03:06:52 149-210-165-102 sshd[14683]: input_userauth_request: invalid user chandra Apr 25 03:06:52 149-210-165-102 sshd[14682]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:52 149-210-165-102 sshd[14682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.42.205 Apr 25 03:06:52 149-210-165-102 sshd[14684]: reverse mapping checking getaddrinfo for 186-210-115-15.xd-dynamic.algarnetsuper.com.br [186.210.115.15] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:06:52 149-210-165-102 sshd[14684]: Invalid user candice from 186.210.115.15 Apr 25 03:06:52 149-210-165-102 sshd[14685]: input_userauth_request: invalid user candice Apr 25 03:06:52 149-210-165-102 sshd[14684]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:06:52 149-210-165-102 sshd[14684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.210.115.15 Apr 25 03:06:54 149-210-165-102 sshd[14682]: Failed password for invalid user chandra from 103.118.42.205 port 37088 ssh2 Apr 25 03:06:54 149-210-165-102 sshd[14683]: Received disconnect from 103.118.42.205: 11: Bye Bye Apr 25 03:06:55 149-210-165-102 sshd[14684]: Failed password for invalid user candice from 186.210.115.15 port 47726 ssh2 Apr 25 03:06:55 149-210-165-102 sshd[14685]: Received disconnect from 186.210.115.15: 11: Bye Bye Apr 25 03:06:59 149-210-165-102 sshd[14686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.109.37 user=root Apr 25 03:07:01 149-210-165-102 sshd[14686]: Failed password for root from 81.68.109.37 port 52450 ssh2 Apr 25 03:07:01 149-210-165-102 sshd[14687]: Received disconnect from 81.68.109.37: 11: Bye Bye Apr 25 03:07:04 149-210-165-102 sshd[14695]: Invalid user web15 from 154.8.233.56 Apr 25 03:07:04 149-210-165-102 sshd[14697]: input_userauth_request: invalid user web15 Apr 25 03:07:04 149-210-165-102 sshd[14695]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:07:04 149-210-165-102 sshd[14695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.56 Apr 25 03:07:04 149-210-165-102 sshd[14694]: reverse mapping checking getaddrinfo for bace9d4a.virtua.com.br [186.206.157.74] failed - POSSIBLE BREAK-IN ATTEMPT! Apr 25 03:07:04 149-210-165-102 sshd[14694]: Invalid user ts3 from 186.206.157.74 Apr 25 03:07:04 149-210-165-102 sshd[14696]: input_userauth_request: invalid user ts3 Apr 25 03:07:04 149-210-165-102 sshd[14694]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:07:04 149-210-165-102 sshd[14694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.157.74 Apr 25 03:07:06 149-210-165-102 sshd[14695]: Failed password for invalid user web15 from 154.8.233.56 port 37232 ssh2 Apr 25 03:07:06 149-210-165-102 sshd[14694]: Failed password for invalid user ts3 from 186.206.157.74 port 10648 ssh2 Apr 25 03:07:07 149-210-165-102 sshd[14697]: Received disconnect from 154.8.233.56: 11: Bye Bye Apr 25 03:07:07 149-210-165-102 sshd[14696]: Received disconnect from 186.206.157.74: 11: Bye Bye Apr 25 03:07:09 149-210-165-102 sshd[14699]: Invalid user q from 42.193.54.22 Apr 25 03:07:09 149-210-165-102 sshd[14700]: input_userauth_request: invalid user q Apr 25 03:07:09 149-210-165-102 sshd[14699]: pam_unix(sshd:auth): check pass; user unknown Apr 25 03:07:09 149-210-165-102 sshd[14699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.193.54.22 Apr 25 03:07:10 149-210-165-102 sshd[14702]: Invalid user testing from 152.136.122.126 Apr 25 03:07:10 149-210-165-102 sshd[14703]: input_userauth_request: invalid user testing