> The details of the abuse-complaint are as follows:
>
> 89.37.193.207: *2025-10-20 04:26*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH brute force
> *2025-10-17 14:13*.*Categories:* Brute-Force, SSH.
> *Comment:* SG02-GC: SSH Brute Force from 89.37.193.207 at 2025-10-17
> 19:43:44 IST
> *2025-10-15 23:30*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH brute force
> *2025-10-15 20:11*.*Categories:* Brute-Force.
> *Comment:* list.rtbh.com.tr report: tcp/0
> *2025-10-14 20:11*.*Categories:* Brute-Force.
> *Comment:* list.rtbh.com.tr report: tcp/0
> *2025-10-14 03:19*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T05:17:47.020243+02:00 rico-j sshd[1483769]:
> Connection from 89.37.193.207 port 32816 on 5.45.102.214 port 22 rdomain «»
> 2025-10-14T05:17:47.347738+02:00 rico-j sshd[1483769]: Invalid user user14
> from 89.37.193.207 port 32816 2025-10-14T05:19:00.602793+02:00 rico-j
> sshd[1484910]: Connection from 89.37.193.207 port 36852 on 5.45.102.214
> port 22 rdomain «» 2025-10-14T05:19:00.940340+02:00 rico-j sshd[1484910]:
> Invalid user karthik from 89.37.193.207 port 36852 …
> *2025-10-14 03:18*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 22:14:51 14966 sshd[24656]: Invalid user tester from 89.37.193.207 port
> 45690 Oct 13 22:14:53 14966 sshd[24656]: Failed password for invalid user
> tester from 89.37.193.207 port 45690 ssh2 Oct 13 22:17:02 14966
> sshd[25042]: Invalid user mgeweb from 89.37.193.207 port 53822 Oct 13
> 22:17:04 14966 sshd[25042]: Failed password for invalid user mgeweb from
> 89.37.193.207 port 53822 ssh2 Oct 13 22:18:18 14966 sshd[25252]: Invalid
> user user14 from 89.37.193.207 port 40302
> *2025-10-14 03:14*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 16:12:57 mtl1 sshd-session[2797941]: Invalid user
> tester from 89.37.193.207 port 38488
> *2025-10-14 02:41*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 04:34:24 vmi291233 sshd[2303293]: Invalid user
> christine from 89.37.193.207 port 41740 Oct 14 04:35:38 vmi291233
> sshd[2303313]: Invalid user scott from 89.37.193.207 port 56802 Oct 14
> 04:39:10 vmi291233 sshd[2303427]: Invalid user sysadmin from 89.37.193.207
> port 52862 Oct 14 04:40:23 vmi291233 sshd[2303438]: Invalid user r from
> 89.37.193.207 port 43932 Oct 14 04:41:32 vmi291233 sshd[2303443]: Invalid
> user zdy from 89.37.193.207 port 53182
> *2025-10-14 02:40*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T02:35:14.047265+00:00 Linux07 sshd[501608]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-14T02:35:16.055126+00:00 Linux07
> sshd[501608]: Failed password for invalid user scott from 89.37.193.207
> port 33122 ssh2 2025-10-14T02:36:26.682396+00:00 Linux07 sshd[504847]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-14T02:36:28.575212+00:00
> Linux07 sshd[504847]: Failed password for root from 89.37.193.207 port
> 51224 ssh2 2025-10-14T02:37:34.644031+00:00 Linux07 sshd[507849]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-14T02:37:36.536188+00:00
> Linux07 sshd[507849]: Failed password for root from 89.37.193.207 port
> 33322 ssh2 2025-10-14T02:38:46.515908+00:00 Linux07 sshd[510609]: Invalid
> user sysadmin from 89.37.193.207 port 57684
> 2025-10-14T02:38:46.518036+00:00 Linux07 …
> *2025-10-14 02:37*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 02:35:21 antti-vps2 sshd[744054]: Invalid user scott
> from 89.37.193.207 port 48554 Oct 14 02:36:33 antti-vps2 sshd[744227]:
> Connection from 89.37.193.207 port 43438 on 10.0.0.124 port 22 rdomain «»
> Oct 14 02:36:33 antti-vps2 sshd[744227]: User root from 89.37.193.207 not
> allowed because none of user’s groups are listed in AllowGroups Oct 14
> 02:37:42 antti-vps2 sshd[744429]: Connection from 89.37.193.207 port 58504
> on 10.0.0.124 port 22 rdomain «» Oct 14 02:37:42 antti-vps2 sshd[744429]:
> User root from 89.37.193.207 not allowed because none of user’s groups are
> listed in AllowGroups …
> *2025-10-14 02:35*.*Categories:* Brute-Force, SSH.
> *Comment:* DE902-V6-FFM: SSH Brute Force from 89.37.193.207 at 2025-10-14
> 08:05:46 IST
> *2025-10-14 02:34*.*Categories:* SSH.
> *Comment:* 89.37.193.207 banned on rtr — Threshold reached: 5 failures
> *2025-10-14 02:31*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (PL/Poland/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 21:31:16 15140 sshd[16333]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=209.74.66.170 user=root Oct 13 21:30:14 15140 sshd[16264]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 21:30:16 15140 sshd[16264]:
> Failed password for root from 89.37.193.207 port 38370 ssh2 Oct 13 21:24:40
> 15140 sshd[15884]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=4.224.36.103 user=root Oct 13 21:24:42
> 15140 sshd[15884]: Failed password for root from 4.224.36.103 port 46496
> ssh2 IP Addresses Blocked: 209.74.66.170 (US/United States/
> monarchianistic-embracery.vpsrdns.web-hosting.com)
> *2025-10-14 01:54*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T03:50:57.366308+02:00 axisverse
> sshd-session[2328220]: Invalid user ftproot from 89.37.193.207 port 50050
> 2025-10-14T03:53:21.997177+02:00 axisverse sshd-session[2332922]: Invalid
> user ftpuser from 89.37.193.207 port 53654 2025-10-14T03:54:35.191506+02:00
> axisverse sshd-session[2335276]: Invalid user lx from 89.37.193.207 port
> 37946 …
> *2025-10-14 01:51*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T02:51:00.545830+01:00 omega.nodes.sillydev.co.uk
> sshd[2769533]: Invalid user ftproot from 89.37.193.207 port 42084
> 2025-10-14T02:51:00.556579+01:00 omega.nodes.sillydev.co.uk
> sshd[2769533]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 2025-10-14T02:51:01.882799+01:00
> omega.nodes.sillydev.co.uk sshd[2769533]: Failed password for invalid
> user ftproot from 89.37.193.207 port 42084 ssh2 …
> *2025-10-14 01:50*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 03:46:51 [redacted] sshd[1462276]: Failed password for
> root from 89.37.193.207 port 37736 ssh2 Oct 14 03:50:19 [redacted]
> sshd[1462317]: Invalid user ftproot from 89.37.193.207 port 48880 …
> *2025-10-14 01:49*.*Categories:* Port Scan.
> *Comment:* ID: 5730368201 | PORT: 57545 |
> https://89-37-193-207.scanthe.net
> *2025-10-14 01:48*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 19:49:48 15757 sshd[5720]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=201.6.100.191 user=root Oct 13 19:49:50 15757 sshd[5720]: Failed
> password for root from 201.6.100.191 port 57170 ssh2 Oct 13 20:47:58 15757
> sshd[10488]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 20:48:00 15757
> sshd[10488]: Failed password for root from 89.37.193.207 port 54106 ssh2
> Oct 13 19:54:38 15757 sshd[6115]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.17.148.221
> user=root IP Addresses Blocked: 201.6.100.191 (BR/Brazil/
> c90664bf.static.spo.virtua.com.br)
> *2025-10-14 01:28*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 03:21:37 Debian-1010-buster-64-minimal sshd[1018209]:
> Invalid user ftpuser from 89.37.193.207 port 59294 Oct 14 03:25:10
> Debian-1010-buster-64-minimal sshd[1105361]: Invalid user mary from
> 89.37.193.207 port 35886 Oct 14 03:26:17 Debian-1010-buster-64-minimal
> sshd[1130108]: Invalid user arif from 89.37.193.207 port 38794 Oct 14
> 03:27:23 Debian-1010-buster-64-minimal sshd[1155934]: Invalid user qui from
> 89.37.193.207 port 33008 Oct 14 03:28:33 Debian-1010-buster-64-minimal
> sshd[1181854]: Invalid user gogs from 89.37.193.207 port 40512 …
> *2025-10-14 01:11*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 14 03:05:16 Debian-1010-buster-64-minimal sshd[628861]:
> Invalid user term2 from 89.37.193.207 port 38598 Oct 14 03:07:31
> Debian-1010-buster-64-minimal sshd[683953]: Invalid user finance from
> 89.37.193.207 port 37448 Oct 14 03:08:43 Debian-1010-buster-64-minimal
> sshd[712486]: Invalid user ssm from 89.37.193.207 port 36330 Oct 14
> 03:09:54 Debian-1010-buster-64-minimal sshd[740375]: Invalid user ubuntu
> from 89.37.193.207 port 46868 Oct 14 03:11:04 Debian-1010-buster-64-minimal
> sshd[769679]: Invalid user demo from 89.37.193.207 port 36096 …
> *2025-10-14 01:08*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 20:04:40 16484 sshd[15186]: Invalid user term2 from 89.37.193.207 port
> 41832 Oct 13 20:04:43 16484 sshd[15186]: Failed password for invalid user
> term2 from 89.37.193.207 port 41832 ssh2 Oct 13 20:07:21 16484 sshd[15573]:
> Invalid user finance from 89.37.193.207 port 49526 Oct 13 20:07:23 16484
> sshd[15573]: Failed password for invalid user finance from 89.37.193.207
> port 49526 ssh2 Oct 13 20:08:33 16484 sshd[15745]: Invalid user ssm from
> 89.37.193.207 port 50130
> *2025-10-14 01:07*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T03:05:01.511829+02:00 terminator.powersource.cx
> sshd-session[258941]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-14T03:05:04.122008+02:00 terminator.powersource.cx
> sshd-session[258941]: Failed password for invalid user term2 from
> 89.37.193.207 port 51312 ssh2 2025-10-14T03:07:26.454470+02:00
> terminator.powersource.cx sshd-session[259155]: Invalid user finance from
> 89.37.193.207 port 51650
> *2025-10-14 01:04*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T01:04:26.798566+00:00 wn-us sshd[2002539]: Invalid
> user term2 from 89.37.193.207 port 34910 …
> *2025-10-14 00:39*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T01:24:02.539175+01:00 dasec-proxy-ssh sshd[915313]:
> Invalid user helen from 89.37.193.207 port 57700
> 2025-10-14T01:24:02.586317+01:00 dasec-proxy-ssh sshd[915313]: Disconnected
> from invalid user helen 89.37.193.207 port 57700 [preauth]
> 2025-10-14T01:25:44.989027+01:00 dasec-proxy-ssh sshd[915355]: Invalid user
> ydy from 89.37.193.207 port 49302 2025-10-14T01:25:45.042787+01:00
> dasec-proxy-ssh sshd[915355]: Disconnected from invalid user ydy
> 89.37.193.207 port 49302 [preauth] 2025-10-14T01:27:01.374822+01:00
> dasec-proxy-ssh sshd[915389]: Disconnected from authenticating user root
> 89.37.193.207 port 51382 [preauth] 2025-10-14T01:28:12.697560+01:00
> dasec-proxy-ssh sshd[915421]: Disconnected from authenticating user root
> 89.37.193.207 port 37114 [preauth] 2025-10-14T01:29:20.182250+01:00
> dasec-proxy-ssh sshd[915447]: Invalid user lee from 89.37.193.207 port
> 55860 2025-10-14T01:29:20.228647+01:00 dasec-proxy-ssh sshd[915447]:
> Disconnected from invalid user lee 89.37.193.207 port 5 …
> *2025-10-14 00:33*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T08:28:58.445389+08:00 *hostname*
> sshd-session[1757303]: Invalid user lee from 89.37.193.207 port 60996
> 2025-10-14T08:31:14.996136+08:00 *hostname* sshd-session[1757317]:
> Connection from 89.37.193.207 port 54964 on 10.7.121.81 port 22 rdomain «»
> 2025-10-14T08:31:15.987529+08:00 *hostname* sshd-session[1757317]: Invalid
> user master from 89.37.193.207 port 54964 2025-10-14T08:33:34.747846+08:00
> *hostname* sshd-session[1757335]: Connection from 89.37.193.207 port 37436
> on 10.7.121.81 port 22 rdomain «» 2025-10-14T08:33:35.727147+08:00
> *hostname* sshd-session[1757335]: Invalid user root/admin from
> 89.37.193.207 port 37436
> *2025-10-14 00:26*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 14
> 00:21:06 23360 sshd[30151]: Invalid user helen from 89.37.193.207 port
> 46978 Oct 14 00:21:08 23360 sshd[30151]: Failed password for invalid user
> helen from 89.37.193.207 port 46978 ssh2 Oct 14 00:24:52 23360 sshd[30800]:
> Invalid user ydy from 89.37.193.207 port 50042 Oct 14 00:24:55 23360
> sshd[30800]: Failed password for invalid user ydy from 89.37.193.207 port
> 50042 ssh2 Oct 14 00:26:09 23360 sshd[30982]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root
> *2025-10-14 00:09*.*Categories:* Brute-Force.
> *Comment:* list.rtbh.com.tr report: tcp/0
> *2025-10-14 00:03*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T01:01:24.927142+01:00 miku.zit.at sshd[1356788]:
> Failed password for invalid user vpnuser1 from 89.37.193.207 port 47330
> ssh2 2025-10-14T01:02:29.001717+01:00 miku.zit.at sshd[1356951]: Invalid
> user admin from 89.37.193.207 port 52188 2025-10-14T01:02:29.010105+01:00
> miku.zit.at sshd[1356951]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-14T01:02:31.155472+01:00 miku.zit.at sshd[1356951]: Failed
> password for invalid user admin from 89.37.193.207 port 52188 ssh2
> 2025-10-14T01:03:32.896194+01:00 miku.zit.at sshd[1357120]: Invalid user
> ilaria from 89.37.193.207 port 38106 …
> *2025-10-13 23:45*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T00:43:34.553495+01:00 miku.zit.at sshd[1353750]:
> Failed password for invalid user lucas from 89.37.193.207 port 41858 ssh2
> 2025-10-14T00:44:49.104608+01:00 miku.zit.at sshd[1354044]: Invalid user
> rootftp from 89.37.193.207 port 49114 2025-10-14T00:44:49.107864+01:00
> miku.zit.at sshd[1354044]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-14T00:44:51.066765+01:00 miku.zit.at sshd[1354044]: Failed
> password for invalid user rootftp from 89.37.193.207 port 49114 ssh2
> 2025-10-14T00:45:55.942326+01:00 miku.zit.at sshd[1354241]: Invalid user
> ubuntu from 89.37.193.207 port 35812 …
> *2025-10-13 23:03*.*Categories:* SSH.
> *Comment:* 2025-10-14T00:01:17.994741+01:00 hostvu2 sshd[3125502]: Failed
> password for root from 89.37.193.207 port 42162 ssh2
> 2025-10-14T00:02:29.847326+01:00 hostvu2 sshd[3125540]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-14T00:02:31.777500+01:00
> hostvu2 sshd[3125540]: Failed password for root from 89.37.193.207 port
> 54076 ssh2 2025-10-14T00:03:45.147983+01:00 hostvu2 sshd[3127863]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-14T00:03:47.851966+01:00
> hostvu2 sshd[3127863]: Failed password for root from 89.37.193.207 port
> 33766 ssh2 …
> *2025-10-13 22:54*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 22:50:18 raspberrypi sshd[14337]: Invalid user bodega
> from 89.37.193.207 port 34100 Oct 13 22:51:29 raspberrypi sshd[14356]:
> Invalid user Azure from 89.37.193.207 port 34028 Oct 13 22:52:41
> raspberrypi sshd[14404]: Invalid user uftp from 89.37.193.207 port 43912
> Oct 13 22:53:49 raspberrypi sshd[14454]: Invalid user regionalci from
> 89.37.193.207 port 38190 Oct 13 22:54:58 raspberrypi sshd[14478]: Invalid
> user anti from 89.37.193.207 port 39212 …
> *2025-10-13 22:39*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 22:35:10 raspberrypi sshd[13876]: Invalid user cy from
> 89.37.193.207 port 43112 Oct 13 22:36:18 raspberrypi sshd[13907]: Invalid
> user mohit from 89.37.193.207 port 54898 Oct 13 22:37:27 raspberrypi
> sshd[13962]: Invalid user scott from 89.37.193.207 port 47960 Oct 13
> 22:38:40 raspberrypi sshd[14001]: Invalid user david from 89.37.193.207
> port 56820 Oct 13 22:39:50 raspberrypi sshd[14025]: Invalid user matin from
> 89.37.193.207 port 39200 …
> *2025-10-13 22:24*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 22:16:30 raspberrypi sshd[13334]: Invalid user mpp from
> 89.37.193.207 port 55076 Oct 13 22:20:02 raspberrypi sshd[13428]: Invalid
> user newuser from 89.37.193.207 port 60068 Oct 13 22:22:20 raspberrypi
> sshd[13521]: Invalid user ftpuser from 89.37.193.207 port 41784 Oct 13
> 22:23:28 raspberrypi sshd[13566]: Invalid user super from 89.37.193.207
> port 51686 Oct 13 22:24:36 raspberrypi sshd[13616]: Invalid user victor
> from 89.37.193.207 port 45488 …
> *2025-10-13 22:22*.*Categories:* Brute-Force, SSH.
> *Comment:* Fail2ban Triggered
> *2025-10-13 22:18*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T11:16:09.504177+13:00 dara sshd[2963963]:
> Disconnected from invalid user mpp 89.37.193.207 port 40546 [preauth]
> 2025-10-14T11:18:37.495269+13:00 dara sshd[2964206]: Connection from
> 89.37.193.207 port 37962 on 135.181.182.173 port 22 rdomain «»
> 2025-10-14T11:18:37.738642+13:00 dara sshd[2964206]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root 2025-10-14T11:18:39.671832+13:00 dara
> sshd[2964206]: Failed password for root from 89.37.193.207 port 37962 ssh2
> 2025-10-14T11:18:39.892794+13:00 dara sshd[2964206]: Disconnected from
> authenticating user root 89.37.193.207 port 37962 [preauth] …
> *2025-10-13 21:39*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH auth scanning — multiple failed logins
> *2025-10-13 21:38*.*Categories:* Brute-Force, SSH.
> *Comment:*
> *2025-10-13 21:36*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-14T03:33:55.782333+06:00 ubuntu sshd[186921]: Failed
> password for root from 89.37.193.207 port 49848 ssh2
> 2025-10-14T03:36:21.214638+06:00 ubuntu sshd[186956]: Invalid user ld from
> 89.37.193.207 port 40478 …
> *2025-10-13 21:35*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 21:31:45 au-mirror sshd[1205907]: Failed password for
> root from 89.37.193.207 port 46092 ssh2 Oct 13 21:35:43 au-mirror
> sshd[1205948]: Invalid user ld from 89.37.193.207 port 53614 …
> *2025-10-13 21:27*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T21:21:52.723697+00:00 ingereck.net sshd[1385418]:
> Invalid user nandan from 89.37.193.207 port 34336
> 2025-10-13T21:23:20.479685+00:00 ingereck.net sshd[1385431]: Invalid user
> sajjad from 89.37.193.207 port 44428 2025-10-13T21:24:44.159894+00:00
> ingereck.net sshd[1385440]: Invalid user adu from 89.37.193.207 port
> 35366 2025-10-13T21:26:07.555647+00:00 ingereck.net sshd[1385460]:
> Invalid user hamza from 89.37.193.207 port 39186
> 2025-10-13T21:27:34.980048+00:00 ingereck.net sshd[1385476]: Invalid user
> ftpuser from 89.37.193.207 port 55532 …
> *2025-10-13 21:15*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 23:14:05 portfolio-web sshd[1981429]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 23:14:07 portfolio-web
> sshd[1981429]: Failed password for root from 89.37.193.207 port 42336 ssh2
> Oct 13 23:15:34 portfolio-web sshd[1981440]: Invalid user profe from
> 89.37.193.207 port 51760 Oct 13 23:15:34 portfolio-web sshd[1981440]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 Oct 13 23:15:37 portfolio-web sshd[1981440]:
> Failed password for invalid user profe from 89.37.193.207 port 51760 ssh2
> …
> *2025-10-13 21:11*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 23:10:07 odin sshd[3777]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 Oct 13 23:10:09 odin sshd[3777]: Failed password for
> invalid user zhang from 89.37.193.207 port 40946 ssh2 Oct 13 23:11:33 odin
> sshd[4332]: Failed password for root from 89.37.193.207 port 46218 ssh2
> *2025-10-13 21:10*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T21:04:46.985799+00:00 ingereck.net sshd[1385008]:
> Invalid user gabby from 89.37.193.207 port 50564
> 2025-10-13T21:06:07.183553+00:00 ingereck.net sshd[1385033]: Invalid user
> rr from 89.37.193.207 port 55822 2025-10-13T21:07:32.012782+00:00
> ingereck.net sshd[1385056]: Invalid user sean from 89.37.193.207 port
> 44860 2025-10-13T21:08:59.833317+00:00 ingereck.net sshd[1385094]:
> Invalid user sepehr from 89.37.193.207 port 46342
> 2025-10-13T21:10:26.179617+00:00 ingereck.net sshd[1385203]: Invalid user
> zhang from 89.37.193.207 port 35634 …
> *2025-10-13 20:53*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T20:42:54.124110+00:00 ingereck.net sshd[1384644]:
> Invalid user zain from 89.37.193.207 port 51076
> 2025-10-13T20:49:03.581891+00:00 ingereck.net sshd[1384707]: Invalid user
> g from 89.37.193.207 port 34312 2025-10-13T20:50:30.112025+00:00
> ingereck.net sshd[1384742]: Invalid user ftptest from 89.37.193.207 port
> 53042 2025-10-13T20:51:53.410638+00:00 ingereck.net sshd[1384770]:
> Invalid user chenhui from 89.37.193.207 port 58420
> 2025-10-13T20:53:14.679462+00:00 ingereck.net sshd[1384791]: Invalid user
> luciano from 89.37.193.207 port 42216 …
> *2025-10-13 20:47*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 22:44:35 portfolio-web sshd[1980958]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 22:44:37 portfolio-web
> sshd[1980958]: Failed password for root from 89.37.193.207 port 36128 ssh2
> Oct 13 22:45:51 portfolio-web sshd[1980997]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 22:45:53 portfolio-web sshd[1980997]:
> Failed password for root from 89.37.193.207 port 54166 ssh2 Oct 13 22:47:06
> portfolio-web sshd[1981010]: Invalid user admin from 89.37.193.207 port
> 39594 …
> *2025-10-13 20:44*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 22:42:00 odin sshd[28374]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 Oct 13 22:42:01 odin sshd[28374]: Failed password for
> invalid user zain from 89.37.193.207 port 37104 ssh2 Oct 13 22:44:51 odin
> sshd[28673]: Failed password for root from 89.37.193.207 port 42654 ssh2
> *2025-10-13 20:43*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T22:43:03.650933+02:00 meet sshd-session[44495]:
> Invalid user zain from 89.37.193.207 port 33708 …
> *2025-10-13 20:10*.*Categories:* Brute-Force.
> *Comment:* list.rtbh.com.tr report: tcp/0
> *2025-10-13 19:56*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T21:53:18.889098+02:00 fra-GW01 sshd[1548854]:
> Failed password for invalid user sk from 89.37.193.207 port 45546 ssh2
> 2025-10-13T21:56:49.841119+02:00 fra-GW01 sshd[1549002]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-13T21:56:52.108571+02:00
> fra-GW01 sshd[1549002]: Failed password for root from 89.37.193.207 port
> 60274 ssh2 …
> *2025-10-13 19:51*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T20:49:34.108013+01:00 miku.zit.at sshd[1308998]:
> Failed password for invalid user test01 from 89.37.193.207 port 34616 ssh2
> 2025-10-13T20:50:42.444459+01:00 miku.zit.at sshd[1309268]: Invalid user
> ubuntu from 89.37.193.207 port 36268 2025-10-13T20:50:42.451827+01:00
> miku.zit.at sshd[1309268]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-13T20:50:44.001939+01:00 miku.zit.at sshd[1309268]: Failed
> password for invalid user ubuntu from 89.37.193.207 port 36268 ssh2
> 2025-10-13T20:51:55.164154+01:00 miku.zit.at sshd[1309468]: Invalid user
> a from 89.37.193.207 port 49630 …
> *2025-10-13 19:43*.*Categories:* Brute-Force, SSH.
> *Comment:* Invalid user botuser from 89.37.193.207 port 38610
> *2025-10-13 19:41*.*Categories:* Brute-Force, SSH.
> *Comment:* Invalid user botuser from 89.37.193.207 port 43654
> *2025-10-13 19:34*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T20:31:58.469411+01:00 miku.zit.at sshd[1306099]:
> Failed password for invalid user ubuntu from 89.37.193.207 port 34504 ssh2
> 2025-10-13T20:33:07.226387+01:00 miku.zit.at sshd[1306272]: Invalid user
> admin1 from 89.37.193.207 port 45574 2025-10-13T20:33:07.233832+01:00
> miku.zit.at sshd[1306272]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-13T20:33:09.621530+01:00 miku.zit.at sshd[1306272]: Failed
> password for invalid user admin1 from 89.37.193.207 port 45574 ssh2
> 2025-10-13T20:34:17.752363+01:00 miku.zit.at sshd[1306445]: Invalid user
> dev from 89.37.193.207 port 50586 …
> *2025-10-13 19:16*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T20:14:21.012027+01:00 miku.zit.at sshd[1302866]:
> Failed password for invalid user sammy from 89.37.193.207 port 35894 ssh2
> 2025-10-13T20:15:40.340252+01:00 miku.zit.at sshd[1303158]: Invalid user
> dockeruser from 89.37.193.207 port 42818 2025-10-13T20:15:40.347792+01:00
> miku.zit.at sshd[1303158]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-13T20:15:42.665646+01:00 miku.zit.at sshd[1303158]: Failed
> password for invalid user dockeruser from 89.37.193.207 port 42818 ssh2
> 2025-10-13T20:16:51.791041+01:00 miku.zit.at sshd[1303597]: Invalid user
> steam from 89.37.193.207 port 39840 …
> *2025-10-13 19:16*.*Categories:* Brute-Force, SSH.
> *Comment:* Log Entry: 2025-10-13T19:12:23241 abuse sshd[1130709]: Invalid
> user sammy from 89.37.193.207 port 40508 Log Entry: 2025-10-13T19:15:06935
> abuse sshd[1130931]: Invalid user dockeruser from 89.37.193.207 port 49254
> Log Entry: 2025-10-13T19:16:19149 abuse sshd[1131010]: Invalid user steam
> from 89.37.193.207 port 45134 Log Entry: …
> *2025-10-13 19:15*.*Categories:* Brute-Force, Web App Attack,
> SSH.
> *Comment:* Default ban by fail2ban
> *2025-10-13 19:12*.*Categories:* Brute-Force, SSH.
> *Comment:* $f2bV_matches
> *2025-10-13 19:10*.*Categories:* Port Scan, Hacking, Brute-Force,
> Exploited Host, Web App Attack.
> *Comment:* 2025-10-14T00:40:35.835038localhost sshd[1525019]: Invalid
> user sammy from 89.37.193.207 port 33268 …
> *2025-10-13 18:00*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH abuse or brute-force attack detected by Fail2Ban in ssh
> jail
> *2025-10-13 17:46*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 12:41:23 15806 sshd[25820]: Invalid user ray from 89.37.193.207 port 55818
> Oct 13 12:41:25 15806 sshd[25820]: Failed password for invalid user ray
> from 89.37.193.207 port 55818 ssh2 Oct 13 12:45:11 15806 sshd[26212]:
> Invalid user work from 89.37.193.207 port 44804 Oct 13 12:45:13 15806
> sshd[26212]: Failed password for invalid user work from 89.37.193.207 port
> 44804 ssh2 Oct 13 12:46:31 15806 sshd[26321]: Invalid user alin from
> 89.37.193.207 port 53842
> *2025-10-13 17:46*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T13:44:01.215982 tlgy-node1 sshd[2782300]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T13:44:03.283761 tlgy-node1
> sshd[2782300]: Failed password for invalid user ray from 89.37.193.207 port
> 53986 ssh2 2025-10-13T13:46:03.500386 tlgy-node1 sshd[2782792]: Invalid
> user work from 89.37.193.207 port 42524 …
> *2025-10-13 17:45*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T17:43:20.037810+00:00 edge-fra-2.senko.network
> sshd[3886852]: Invalid user ray from 89.37.193.207 port 60708
> 2025-10-13T17:45:46.129653+00:00 edge-fra-2.senko.network sshd[3886948]:
> Invalid user work from 89.37.193.207 port 34444 …
> *2025-10-13 16:54*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 11:51:22 14153 sshd[26867]: Invalid user aria from 89.37.193.207 port 60374
> Oct 13 11:51:24 14153 sshd[26867]: Failed password for invalid user aria
> from 89.37.193.207 port 60374 ssh2 Oct 13 11:53:24 14153 sshd[27029]:
> Invalid user ftpuser from 89.37.193.207 port 46416 Oct 13 11:53:26 14153
> sshd[27029]: Failed password for invalid user ftpuser from 89.37.193.207
> port 46416 ssh2 Oct 13 11:54:46 14153 sshd[27121]: Invalid user testuser
> from 89.37.193.207 port 52554
> *2025-10-13 16:53*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T18:51:46.186028+02:00 fra-GW01 sshd[1537946]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T18:51:47.536668+02:00 fra-GW01
> sshd[1537946]: Failed password for invalid user aria from 89.37.193.207
> port 46728 ssh2 2025-10-13T18:53:34.406193+02:00 fra-GW01 sshd[1538132]:
> Invalid user ftpuser from 89.37.193.207 port 37544 …
> *2025-10-13 16:53*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T11:50:13.148302-05:00 ip-172-31-76-241
> sshd[983557]: Invalid user aria from 89.37.193.207 port 37084
> 2025-10-13T11:50:13.288730-05:00 ip-172-31-76-241 sshd[983557]:
> Disconnected from invalid user aria 89.37.193.207 port 37084 [preauth]
> 2025-10-13T11:52:59.900891-05:00 ip-172-31-76-241 sshd[1023332]: Invalid
> user ftpuser from 89.37.193.207 port 48958 …
> *2025-10-13 16:10*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 17:06:01 ipmi sshd[40953]: Disconnected from
> authenticating user root 89.37.193.207 port 34670 [preauth] Oct 13 17:09:08
> ipmi sshd[41150]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 17:09:10
> ipmi sshd[41150]: Failed password for root from 89.37.193.207 port 36750
> ssh2 Oct 13 17:09:10 ipmi sshd[41150]: Disconnected from authenticating
> user root 89.37.193.207 port 36750 [preauth] Oct 13 17:10:27 ipmi
> sshd[41256]: Invalid user botuser from 89.37.193.207 port 60782 …
> *2025-10-13 16:05*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 11:05:48 12389 sshd[28715]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 10:31:48 12389 sshd[26052]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=119.255.245.44 user=root Oct 13 10:31:50 12389 sshd[26052]:
> Failed password for root from 119.255.245.44 port 46722 ssh2 Oct 13
> 11:05:08 12389 sshd[28692]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=212.19.117.204 user=root Oct 13
> 11:05:10 12389 sshd[28692]: Failed password for root from 212.19.117.204
> port 41447 ssh2 IP Addresses Blocked:
> *2025-10-13 15:59*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 18:58:19 www sshd\[18514\]: Invalid user devops from
> 89.37.193.207Oct 13 18:58:21 www sshd\[18514\]: Failed password for invalid
> user devops from 89.37.193.207 port 42728 ssh2Oct 13 18:59:30 www
> sshd\[18538\]: Invalid user becky from 89.37.193.207 …
> *2025-10-13 15:55*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 17:52:57 m2048 sshd[3963318]: Invalid user sonarr from
> 89.37.193.207 port 60364 Oct 13 17:52:59 m2048 sshd[3963318]: Failed
> password for invalid user sonarr from 89.37.193.207 port 60364 ssh2 Oct 13
> 17:54:12 m2048 sshd[3963423]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13
> 17:54:14 m2048 sshd[3963423]: Failed password for root from 89.37.193.207
> port 57376 ssh2 Oct 13 17:55:26 m2048 sshd[3963545]: Invalid user rana from
> 89.37.193.207 port 45944 …
> *2025-10-13 15:42*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 18:41:15 www sshd\[18163\]: Invalid user adnan from
> 89.37.193.207Oct 13 18:41:18 www sshd\[18163\]: Failed password for invalid
> user adnan from 89.37.193.207 port 33416 ssh2Oct 13 18:42:26 www
> sshd\[18186\]: Invalid user summer from 89.37.193.207 …
> *2025-10-13 15:29*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T17:26:04.364860+02:00 ns402 sshd[1629988]: Failed
> password for invalid user backend from 89.37.193.207 port 36972 ssh2
> 2025-10-13T17:26:04.496363+02:00 ns402 sshd[1629988]: Disconnected from
> invalid user backend 89.37.193.207 port 36972 [preauth]
> 2025-10-13T17:27:20.957910+02:00 ns402 sshd[1630266]: Invalid user sean
> from 89.37.193.207 port 56424 2025-10-13T17:27:20.972437+02:00 ns402
> sshd[1630266]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 2025-10-13T17:27:22.851067+02:00
> ns402 sshd[1630266]: Failed password for invalid user sean from
> 89.37.193.207 port 56424 ssh2 2025-10-13T17:27:22.921966+02:00 ns402
> sshd[1630266]: Disconnected from invalid user sean 89.37.193.207 port 56424
> [preauth] 2025-10-13T17:28:34.034136+02:00 ns402 sshd[1630506]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-13T17:28:35.602252+02:00 ns402
> sshd[1630506]: Failed pas …
> *2025-10-13 15:27*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 17:26:11 m2048 sshd[3962079]: Failed password for
> invalid user backend from 89.37.193.207 port 56022 ssh2 Oct 13 17:27:27
> m2048 sshd[3962096]: Invalid user sean from 89.37.193.207 port 53662 Oct 13
> 17:27:27 m2048 sshd[3962096]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 Oct 13 17:27:27
> m2048 sshd[3962096]: Invalid user sean from 89.37.193.207 port 53662 Oct 13
> 17:27:29 m2048 sshd[3962096]: Failed password for invalid user sean from
> 89.37.193.207 port 53662 ssh2 …
> *2025-10-13 15:25*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 18:20:25 www sshd\[17740\]: Failed password for root
> from 89.37.193.207 port 40482 ssh2Oct 13 18:25:18 www sshd\[17843\]:
> Invalid user backend from 89.37.193.207Oct 13 18:25:20 www sshd\[17843\]:
> Failed password for invalid user backend from 89.37.193.207 port 51508 ssh2
> …
> *2025-10-13 15:25*.*Categories:* SSH.
> *Comment:* Oct 13 16:25:02 l03 sshd[3278]: Invalid user backend from
> 89.37.193.207 port 36152 …
> *2025-10-13 15:19*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 10:06:31 14106 sshd[14192]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=78.89.154.59 user=root Oct 13 10:06:33 14106 sshd[14192]:
> Failed password for root from 78.89.154.59 port 34944 ssh2 Oct 13 10:02:43
> 14106 sshd[13828]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=79.116.71.204 user=root Oct 13 10:19:45
> 14106 sshd[15215]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 10:19:46
> 14106 sshd[15215]: Failed password for root from 89.37.193.207 port 33682
> ssh2 IP Addresses Blocked: 78.89.154.59 (KW/Kuwait/-) 79.116.71.204
> (ES/Spain/79-116-71-204.digimobil.es)
> *2025-10-13 14:37*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 09:35:52 16988 sshd[23185]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=162.144.85.107 user=root Oct 13 09:35:53 16988 sshd[23185]:
> Failed password for root from 162.144.85.107 port 54846 ssh2 Oct 13
> 09:15:51 16988 sshd[21679]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.106.74 user=root Oct 13
> 09:15:53 16988 sshd[21679]: Failed password for root from 103.136.106.74
> port 49814 ssh2 Oct 13 09:37:06 16988 sshd[23324]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root IP Addresses Blocked: 162.144.85.107
> (US/United States/162-144-85-107.unifiedlayer.com) 103.136.106.74
> (BD/Bangladesh/-)
> *2025-10-13 14:36*.*Categories:* Port Scan.
> *Comment:* ports, 22/24H:1/7D:1
> *2025-10-13 13:57*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 13:54:33 ubuntu sshd[1495434]: Failed password for root
> from 89.37.193.207 port 46814 ssh2 Oct 13 13:55:51 ubuntu sshd[1495479]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 13:55:54 ubuntu sshd[1495479]:
> Failed password for root from 89.37.193.207 port 45450 ssh2 Oct 13 13:57:12
> ubuntu sshd[1495481]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 13:57:14
> ubuntu sshd[1495481]: Failed password for root from 89.37.193.207 port
> 36318 ssh2 …
> *2025-10-13 13:53*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 08:48:15 18800 sshd[5177]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13
> 08:48:17 18800 sshd[5177]: Failed password for root from 89.37.193.207 port
> 59244 ssh2 Oct 13 08:52:11 18800 sshd[5483]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 08:52:13 18800 sshd[5483]: Failed
> password for root from 89.37.193.207 port 37308 ssh2 Oct 13 08:53:36 18800
> sshd[5563]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> *2025-10-13 13:50*.*Categories:* Port Scan, Brute-Force, SSH.
> *Comment:* Port probe to tcp/22 (ssh) [srv124]
> *2025-10-13 12:37*.*Categories:* Brute-Force.
> *Comment:* $f2bV_matches
> *2025-10-13 12:31*.*Categories:* Brute-Force, Web App Attack,
> SSH.
> *Comment:* Automatic Reporting — Brute Force Attempts
> *2025-10-13 12:27*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 07:24:25 14113 sshd[19528]: Invalid user www from 89.37.193.207 port 41110
> Oct 13 07:24:26 14113 sshd[19528]: Failed password for invalid user www
> from 89.37.193.207 port 41110 ssh2 Oct 13 07:26:15 14113 sshd[19819]:
> Invalid user zenith from 89.37.193.207 port 41454 Oct 13 07:26:17 14113
> sshd[19819]: Failed password for invalid user zenith from 89.37.193.207
> port 41454 ssh2 Oct 13 07:27:43 14113 sshd[20015]: Invalid user pippo from
> 89.37.193.207 port 39566
> *2025-10-13 12:27*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T05:23:56.977096-07:00 dmit-vm-pro-plamspring-lax
> sshd[764308]: Invalid user www from 89.37.193.207 port 35832
> 2025-10-13T05:26:04.546496-07:00 dmit-vm-pro-plamspring-lax sshd[764331]:
> Invalid user zenith from 89.37.193.207 port 50244
> 2025-10-13T05:27:33.163463-07:00 dmit-vm-pro-plamspring-lax sshd[764360]:
> Invalid user pippo from 89.37.193.207 port 55012 …
> *2025-10-13 12:21*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 12:21:35 Sildom2 sshd[1229482]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 Oct 13 12:21:37 Sildom2 sshd[1229482]: Failed password
> for invalid user www from 89.37.193.207 port 40774 ssh2 …
> *2025-10-13 11:43*.*Categories:* Hacking, Brute-Force, SSH.
> *Comment:* Oct 13 11:40:42 lewisgillcom sshd[3459673]: Failed password
> for invalid user nominatim from 89.37.193.207 port 57956 ssh2 Oct 13
> 11:42:07 lewisgillcom sshd[3460070]: Invalid user admin1 from 89.37.193.207
> port 52242 Oct 13 11:42:07 lewisgillcom sshd[3460070]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 Oct 13 11:42:09 lewisgillcom sshd[3460070]: Failed
> password for invalid user admin1 from 89.37.193.207 port 52242 ssh2 Oct 13
> 11:43:27 lewisgillcom sshd[3460272]: Invalid user csgoserver from
> 89.37.193.207 port 42234 …
> *2025-10-13 11:43*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 06:39:32 16144 sshd[17009]: Invalid user nominatim from 89.37.193.207 port
> 54152 Oct 13 06:39:34 16144 sshd[17009]: Failed password for invalid user
> nominatim from 89.37.193.207 port 54152 ssh2 Oct 13 06:41:46 16144
> sshd[17161]: Invalid user admin1 from 89.37.193.207 port 36398 Oct 13
> 06:41:48 16144 sshd[17161]: Failed password for invalid user admin1 from
> 89.37.193.207 port 36398 ssh2 Oct 13 06:43:07 16144 sshd[17285]: Invalid
> user csgoserver from 89.37.193.207 port 55238
> *2025-10-13 11:42*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 13:38:39 main1 sshd[1259360]: Invalid user nominatim
> from 89.37.193.207 port 40834 Oct 13 13:41:28 main1 sshd[1259795]: Invalid
> user admin1 from 89.37.193.207 port 57314 Oct 13 13:42:49 main1
> sshd[1260121]: Invalid user csgoserver from 89.37.193.207 port 37792 …
> *2025-10-13 11:42*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 13:37:51 bonsai sshd[13617]: Invalid user nominatim
> from 89.37.193.207 Oct 13 13:41:12 bonsai sshd[24278]: Invalid user admin1
> from 89.37.193.207 Oct 13 13:42:32 bonsai sshd[24462]: Invalid user
> csgoserver from 89.37.193.207 …
> *2025-10-13 11:41*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T11:39:11.931093+00:00 nextcloud sshd[1631196]:
> Failed password for invalid user nominatim from 89.37.193.207 port 49502
> ssh2 2025-10-13T11:41:38.303284+00:00 nextcloud sshd[1631425]: Invalid user
> admin1 from 89.37.193.207 port 52414 2025-10-13T11:41:38.310137+00:00
> nextcloud sshd[1631425]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-13T11:41:40.109331+00:00 nextcloud sshd[1631425]: Failed password
> for invalid user admin1 from 89.37.193.207 port 52414 ssh2 …
> *2025-10-13 11:41*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T11:39:08.746220+00:00 polaris sshd[1089930]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T11:39:10.274378+00:00 polaris
> sshd[1089930]: Failed password for invalid user nominatim from
> 89.37.193.207 port 60026 ssh2 2025-10-13T11:41:38.011958+00:00 polaris
> sshd[1090216]: Invalid user admin1 from 89.37.193.207 port 46032 …
> *2025-10-13 10:53*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 05:49:26 15423 sshd[16111]: Invalid user huawei from 89.37.193.207 port
> 49750 Oct 13 05:49:28 15423 sshd[16111]: Failed password for invalid user
> huawei from 89.37.193.207 port 49750 ssh2 Oct 13 05:51:40 15423
> sshd[16269]: Invalid user ark from 89.37.193.207 port 54154 Oct 13 05:51:42
> 15423 sshd[16269]: Failed password for invalid user ark from 89.37.193.207
> port 54154 ssh2 Oct 13 05:53:00 15423 sshd[16352]: Invalid user ahsan from
> 89.37.193.207 port 37726
> *2025-10-13 10:50*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T12:50:36.548121+02:00 main sshd[520550]: Invalid
> user huawei from 89.37.193.207 port 57578 …
> *2025-10-13 10:27*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 12:26:21 pegasus sshd[2728847]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 12:26:23 pegasus sshd[2728847]: Failed
> password for root from 89.37.193.207 port 42138 ssh2 Oct 13 12:27:38
> pegasus sshd[2729057]: Invalid user geek from 89.37.193.207 port 49092 Oct
> 13 12:27:38 pegasus sshd[2729057]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 Oct 13
> 12:27:39 pegasus sshd[2729057]: Failed password for invalid user geek from
> 89.37.193.207 port 49092 ssh2
> *2025-10-13 10:05*.*Categories:* Brute-Force, SSH.
> *Comment:* CrowdSec engine detected malicious behavior. Scenario
> ‘crowdsecurity/ssh-slow-bf’ triggered with 17 events.
> *2025-10-13 10:03*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 04:59:23 15486 sshd[23741]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=nginx Oct 13
> 04:59:25 15486 sshd[23741]: Failed password for nginx from 89.37.193.207
> port 53238 ssh2 Oct 13 05:02:11 15486 sshd[24004]: Invalid user runner from
> 89.37.193.207 port 38870 Oct 13 05:02:13 15486 sshd[24004]: Failed password
> for invalid user runner from 89.37.193.207 port 38870 ssh2 Oct 13 05:03:31
> 15486 sshd[24113]: Invalid user exx from 89.37.193.207 port 36638
> *2025-10-13 10:03*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 12:02:32 pegasus sshd[2721607]: Invalid user runner
> from 89.37.193.207 port 58836 Oct 13 12:02:32 pegasus sshd[2721607]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 Oct 13 12:02:34 pegasus sshd[2721607]: Failed
> password for invalid user runner from 89.37.193.207 port 58836 ssh2 Oct 13
> 12:03:51 pegasus sshd[2722217]: Invalid user exx from 89.37.193.207 port
> 33604
> *2025-10-13 09:15*.*Categories:* Brute-Force, SSH.
> *Comment:* $f2bV_matches
> *2025-10-13 08:53*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 10:44:53 hydrogen sshd[3917746]: Invalid user zzl from
> 89.37.193.207 port 40866 Oct 13 10:46:02 hydrogen sshd[3918398]: Invalid
> user penis from 89.37.193.207 port 58346 Oct 13 10:47:15 hydrogen
> sshd[3918911]: Invalid user chris from 89.37.193.207 port 56308 Oct 13
> 10:48:21 hydrogen sshd[3919456]: Invalid user ftpuser from 89.37.193.207
> port 35466 Oct 13 10:53:09 hydrogen sshd[3921790]: Invalid user fabian from
> 89.37.193.207 port 55464 …
> *2025-10-13 08:34*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 10:25:12 hydrogen sshd[3908060]: Invalid user seven
> from 89.37.193.207 port 58806 Oct 13 10:28:22 hydrogen sshd[3909542]:
> Invalid user school from 89.37.193.207 port 41100 Oct 13 10:30:39 hydrogen
> sshd[3910692]: Invalid user iptv from 89.37.193.207 port 51236 Oct 13
> 10:33:06 hydrogen sshd[3911856]: Invalid user daniel from 89.37.193.207
> port 58760 Oct 13 10:34:18 hydrogen sshd[3912382]: Invalid user holu from
> 89.37.193.207 port 39830 …
> *2025-10-13 08:27*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T10:25:54.538753+02:00 rpi4 sshd[5049]: Invalid user
> seven from 89.37.193.207 port 42920 2025-10-13T10:25:54.561594+02:00 rpi4
> sshd[5049]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 2025-10-13T10:25:56.111919+02:00
> rpi4 sshd[5049]: Failed password for invalid user seven from 89.37.193.207
> port 42920 ssh2 2025-10-13T10:27:07.966792+02:00 rpi4 sshd[5068]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-13T10:27:09.205746+02:00 rpi4
> sshd[5068]: Failed password for root from 89.37.193.207 port 53692 ssh2 …
> *2025-10-13 08:24*.*Categories:* Brute-Force.
> *Comment:* Oct 13 08:24:55 hecnet-us-east-gw sshd[98568]: Invalid user
> cloud from 89.37.193.207 port 46084 Oct 13 08:24:57 hecnet-us-east-gw
> sshd[98568]: Failed password for invalid user cloud from 89.37.193.207 port
> 46084 ssh2 Oct 13 08:24:57 hecnet-us-east-gw sshd[98568]: Disconnected from
> invalid user cloud 89.37.193.207 port 46084 [preauth] …
> *2025-10-13 08:15*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 02:27:46 13144 sshd[12807]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=23.94.182.3 user=root Oct 13 02:27:49 13144 sshd[12807]:
> Failed password for root from 23.94.182.3 port 56948 ssh2 Oct 13 03:14:59
> 13144 sshd[17220]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 03:15:01
> 13144 sshd[17220]: Failed password for root from 89.37.193.207 port 34724
> ssh2 Oct 13 02:28:26 13144 sshd[12878]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.182.3 user=root
> IP Addresses Blocked: 23.94.182.3 (US/United States/
> 23-94-182-3-host.colocrossing.com)
> *2025-10-13 08:14*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T10:14:59.181747+02:00 psifactor
> sshd-session[3471263]: Disconnected from authenticating user root
> 89.37.193.207 port 56660 [preauth] … (mode: instant ban, root access or
> sth similar)
> *2025-10-13 08:11*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 05:11:59 vidsell sshd[3316863]: Invalid user deploy
> from 89.37.193.207 port 50940 Oct 13 05:11:59 vidsell sshd[3316863]:
> Disconnected from invalid user deploy 89.37.193.207 port 50940 [preauth] …
> *2025-10-13 07:51*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T07:44:31.505422+00:00 scw-871879 sshd[1465195]:
> Invalid user admin1234 from 89.37.193.207 port 49058
> 2025-10-13T07:48:03.347868+00:00 scw-871879 sshd[1465551]: Invalid user
> user from 89.37.193.207 port 48088 2025-10-13T07:49:12.616964+00:00
> scw-871879 sshd[1465745]: Invalid user user14 from 89.37.193.207 port 53252
> 2025-10-13T07:50:19.916176+00:00 scw-871879 sshd[1465784]: Invalid user
> mark from 89.37.193.207 port 53178 2025-10-13T07:51:30.580945+00:00
> scw-871879 sshd[1465885]: Invalid user dps from 89.37.193.207 port 38542 …
> *2025-10-13 07:33*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T07:23:51.487923+00:00 scw-871879 sshd[1463467]:
> Invalid user denes from 89.37.193.207 port 51822
> 2025-10-13T07:26:59.994943+00:00 scw-871879 sshd[1463604]: Invalid user
> helen from 89.37.193.207 port 34988 2025-10-13T07:29:33.468343+00:00
> scw-871879 sshd[1463718]: Invalid user kariman from 89.37.193.207 port
> 55148 2025-10-13T07:30:42.140898+00:00 scw-871879 sshd[1463762]: Invalid
> user deploy from 89.37.193.207 port 44838 2025-10-13T07:33:52.031023+00:00
> scw-871879 sshd[1464046]: Invalid user holu from 89.37.193.207 port 45688
> …
> *2025-10-13 07:30*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T09:24:07.169925+02:00 axisverse
> sshd-session[3564307]: Invalid user denes from 89.37.193.207 port 34326
> 2025-10-13T09:27:04.054740+02:00 axisverse sshd-session[3572021]: Invalid
> user helen from 89.37.193.207 port 55078 2025-10-13T09:30:45.684764+02:00
> axisverse sshd-session[3579520]: Invalid user deploy from 89.37.193.207
> port 55294 …
> *2025-10-13 07:30*.*Categories:* SSH.
> *Comment:* SSH brute-force attempt detected by Fail2Ban
> *2025-10-13 07:28*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 02:24:23 9759 sshd[26791]: Invalid user denes from 89.37.193.207 port 58012
> Oct 13 02:24:25 9759 sshd[26791]: Failed password for invalid user denes
> from 89.37.193.207 port 58012 ssh2 Oct 13 02:27:09 9759 sshd[27185]:
> Invalid user helen from 89.37.193.207 port 53186 Oct 13 02:27:11 9759
> sshd[27185]: Failed password for invalid user helen from 89.37.193.207 port
> 53186 ssh2 Oct 13 02:28:27 9759 sshd[27282]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root
> *2025-10-13 07:14*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH abuse or brute-force attack detected by Fail2Ban in ssh
> jail
> *2025-10-13 07:13*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T07:08:41.819592+00:00 de-fsn1-sbc1 sshd[4054492]:
> Invalid user arkserver from 89.37.193.207 port 50230
> 2025-10-13T07:11:20.735865+00:00 de-fsn1-sbc1 sshd[4054509]: Invalid user
> ftpuser from 89.37.193.207 port 48370 2025-10-13T07:13:56.776703+00:00
> de-fsn1-sbc1 sshd[4054551]: Invalid user seafile from 89.37.193.207 port
> 43776 …
> *2025-10-13 07:12*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 08:11:24 nervous-edison8 sshd[3729837]: Invalid user
> ftpuser from 89.37.193.207 port 53928 Oct 13 08:11:24 nervous-edison8
> sshd[3729837]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 Oct 13 08:11:25 nervous-edison8
> sshd[3729837]: Failed password for invalid user ftpuser from 89.37.193.207
> port 53928 ssh2 Oct 13 08:12:43 nervous-edison8 sshd[3730403]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 08:12:45 nervous-edison8
> sshd[3730403]: Failed password for root from 89.37.193.207 port 38352 ssh2
> …
> *2025-10-13 07:12*.*Categories:* Brute-Force, SSH.
> *Comment:* SG02-GC: SSH Brute Force from 89.37.193.207 at 2025-10-13
> 12:42:20 IST
> *2025-10-13 07:11*.*Categories:* Brute-Force, SSH.
> *Comment:* $f2bV_matches
> *2025-10-13 07:08*.*Categories:* SSH.
> *Comment:* Fail2Ban SSH login block from 89.37.193.207
> *2025-10-13 07:04*.*Categories:* DDoS Attack Participating, Ping
> of Death, Web Spam, Email Spam, Brute-Force, Bad Web Bot, SSH.
> *Comment:* Oct 13 09:00:43 v2202301167543214332 sshd[1313515]: Failed
> password for invalid user botuser from 89.37.193.207 port 33280 ssh2 Oct 13
> 09:02:22 v2202301167543214332 sshd[1313534]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 09:02:24 v2202301167543214332
> sshd[1313534]: Failed password for root from 89.37.193.207 port 58908 ssh2
> Oct 13 09:04:03 v2202301167543214332 sshd[1313541]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 09:04:05 v2202301167543214332
> sshd[1313541]: Failed password for root from 89.37.193.207 port 54548 ssh2
> …
> *2025-10-13 06:47*.*Categories:* DDoS Attack Participating, Ping
> of Death, Web Spam, Email Spam, Brute-Force, Bad Web Bot, SSH.
> *Comment:* Oct 13 08:46:12 v2202301167543214332 sshd[1313318]: Invalid
> user frappe from 89.37.193.207 port 47288 Oct 13 08:46:12
> v2202301167543214332 sshd[1313318]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 Oct 13
> 08:46:12 v2202301167543214332 sshd[1313318]: Invalid user frappe from
> 89.37.193.207 port 47288 Oct 13 08:46:14 v2202301167543214332
> sshd[1313318]: Failed password for invalid user frappe from 89.37.193.207
> port 47288 ssh2 Oct 13 08:47:49 v2202301167543214332 sshd[1313338]: Invalid
> user vpn from 89.37.193.207 port 46024 …
> *2025-10-13 06:31*.*Categories:* DDoS Attack Participating, Ping
> of Death, Web Spam, Email Spam, Brute-Force, Bad Web Bot, SSH.
> *Comment:* Oct 13 08:28:22 v2202301167543214332 sshd[1312971]: Failed
> password for root from 89.37.193.207 port 58986 ssh2 Oct 13 08:29:58
> v2202301167543214332 sshd[1312978]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> Oct 13 08:30:00 v2202301167543214332 sshd[1312978]: Failed password for
> root from 89.37.193.207 port 45548 ssh2 Oct 13 08:31:38
> v2202301167543214332 sshd[1313005]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> Oct 13 08:31:40 v2202301167543214332 sshd[1313005]: Failed password for
> root from 89.37.193.207 port 39816 ssh2 …
> *2025-10-13 06:20*.*Categories:* Brute-Force.
> *Comment:* Oct 13 06:19:00 bud01-01-vpn sshd[183862]: Failed password for
> root from 89.37.193.207 port 36208 ssh2 Oct 13 06:20:33 bud01-01-vpn
> sshd[183919]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 06:20:35
> bud01-01-vpn sshd[183919]: Failed password for root from 89.37.193.207 port
> 40940 ssh2 …
> *2025-10-13 06:14*.*Categories:* DDoS Attack Participating, Ping
> of Death, Web Spam, Email Spam, Brute-Force, Bad Web Bot, SSH.
> *Comment:* Oct 13 08:11:12 v2202301167543214332 sshd[1312798]: Failed
> password for root from 89.37.193.207 port 45456 ssh2 Oct 13 08:12:38
> v2202301167543214332 sshd[1312817]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> Oct 13 08:12:40 v2202301167543214332 sshd[1312817]: Failed password for
> root from 89.37.193.207 port 43508 ssh2 Oct 13 08:14:02
> v2202301167543214332 sshd[1312821]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> Oct 13 08:14:04 v2202301167543214332 sshd[1312821]: Failed password for
> root from 89.37.193.207 port 51420 ssh2 …
> *2025-10-13 06:13*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 10
> in the last 3600 secs
> *2025-10-13 06:13*.*Categories:* Brute-Force.
> *Comment:* [sshd] (D1_AjieDevAIO-IP-126) Fail2Ban Jail: sshd auto-report
> *2025-10-13 06:10*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T06:09:02.631165+00:00 edge-con-sao01.int.pdx.net.uk
> sshd[1525991]: Failed password for root from 89.37.193.207 port 57724 ssh2
> 2025-10-13T06:10:25.253561+00:00 edge-con-sao01.int.pdx.net.uk
> sshd[1526413]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> 2025-10-13T06:10:27.031197+00:00 edge-con-sao01.int.pdx.net.uk
> sshd[1526413]: Failed password for root from 89.37.193.207 port 35438 ssh2
> …
> *2025-10-13 06:10*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T06:06:14.169430+00:00 eu-north-sto1 sshd[1074416]:
> Disconnected from authenticating user root 89.37.193.207 port 45108
> [preauth] 2025-10-13T06:09:00.478611+00:00 eu-north-sto1 sshd[1083926]:
> Disconnected from authenticating user root 89.37.193.207 port 44486
> [preauth] 2025-10-13T06:10:24.901949+00:00 eu-north-sto1 sshd[1089088]:
> Disconnected from authenticating user root 89.37.193.207 port 49004
> [preauth] …
> *2025-10-13 06:08*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [root] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 13 00:57:51 14499 sshd[12114]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=152.32.163.183 user=root Oct 13 00:57:54 14499 sshd[12114]:
> Failed password for root from 152.32.163.183 port 53050 ssh2 Oct 13
> 01:07:50 14499 sshd[13056]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13
> 01:05:33 14499 sshd[12888]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.191.166 user=root Oct 13
> 01:05:35 14499 sshd[12888]: Failed password for root from 119.96.191.166
> port 59978 ssh2 IP Addresses Blocked: 152.32.163.183 (VN/Vietnam/-)
> *2025-10-13 05:51*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 05:48:46 webundsoshit sshd[3550224]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 05:48:47 webundsoshit
> sshd[3550224]: Failed password for root from 89.37.193.207 port 38486 ssh2
> Oct 13 05:49:57 webundsoshit sshd[3550430]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 user=root Oct 13 05:49:59 webundsoshit sshd[3550430]:
> Failed password for root from 89.37.193.207 port 51360 ssh2 Oct 13 05:51:11
> webundsoshit sshd[3550744]: Invalid user deploy from 89.37.193.207 port
> 40280 …
> *2025-10-13 05:23*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 05:21:58 webundsoshit sshd[3544787]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 Oct 13 05:22:00 webundsoshit sshd[3544787]:
> Failed password for invalid user bigdata from 89.37.193.207 port 40826 ssh2
> Oct 13 05:23:14 webundsoshit sshd[3545107]: Invalid user newuser1 from
> 89.37.193.207 port 35244 Oct 13 05:23:14 webundsoshit sshd[3545107]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 Oct 13 05:23:16 webundsoshit sshd[3545107]:
> Failed password for invalid user newuser1 from 89.37.193.207 port 35244
> ssh2 …
> *2025-10-13 05:22*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 00:18:49 21567 sshd[31938]: pam_unix(sshd:auth): authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13
> 00:18:51 21567 sshd[31938]: Failed password for root from 89.37.193.207
> port 50966 ssh2 Oct 13 00:21:27 21567 sshd[32160]: Invalid user bigdata
> from 89.37.193.207 port 53226 Oct 13 00:21:29 21567 sshd[32160]: Failed
> password for invalid user bigdata from 89.37.193.207 port 53226 ssh2 Oct 13
> 00:22:46 21567 sshd[32593]: Invalid user newuser1 from 89.37.193.207 port
> 51166
> *2025-10-13 05:21*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 12 23:21:51 b146-17 sshd[1443617]: Invalid user bigdata
> from 89.37.193.207 port 33630 Oct 12 23:21:51 b146-17 sshd[1443617]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 Oct 12 23:21:53 b146-17 sshd[1443617]: Failed
> password for invalid user bigdata from 89.37.193.207 port 33630 ssh2 …
> *2025-10-13 04:36*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (AE/United Arab
> Emirates/-)
> *2025-10-13 04:32*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 12
> 23:29:09 17911 sshd[11923]: Invalid user eliot from 89.37.193.207 port
> 59440 Oct 12 23:29:10 17911 sshd[11923]: Failed password for invalid user
> eliot from 89.37.193.207 port 59440 ssh2 Oct 12 23:30:54 17911 sshd[12120]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 12 23:30:57 17911 sshd[12120]:
> Failed password for root from 89.37.193.207 port 46058 ssh2 Oct 12 23:32:09
> 17911 sshd[12326]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> *2025-10-13 04:30*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T06:28:30.638277+02:00 games.mrejata.eu
> sshd[545772]: Failed password for invalid user eliot from 89.37.193.207
> port 56124 ssh2 2025-10-13T06:30:42.373214+02:00 games.mrejata.eu
> sshd[545780]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root
> 2025-10-13T06:30:44.592754+02:00 games.mrejata.eu sshd[545780]: Failed
> password for root from 89.37.193.207 port 34870 ssh2 …
> *2025-10-13 04:30*.*Categories:* Brute-Force, SSH.
> *Comment:* Fail2Ban: activité malveillante détectée (jail: sshd)
> *2025-10-13 04:01*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-12T22:54:56.304496-05:00 instance-20240522-152753
> sshd[1174946]: Invalid user zs from 89.37.193.207 port 56480
> 2025-10-12T22:57:28.731436-05:00 instance-20240522-152753 sshd[1175038]:
> Invalid user adminuser from 89.37.193.207 port 39926
> 2025-10-12T22:58:45.512430-05:00 instance-20240522-152753 sshd[1175062]:
> Invalid user abe from 89.37.193.207 port 34202
> 2025-10-12T23:01:13.439381-05:00 instance-20240522-152753 sshd[1175622]:
> Invalid user dat from 89.37.193.207 port 36582 …
> *2025-10-13 03:50*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T03:51:19.757629+00:00 prod-westeu sshd[2607551]:
> Invalid user spike from 89.37.193.207 port 36332
> 2025-10-13T03:51:19.761747+00:00 prod-westeu sshd[2607551]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T03:51:21.916076+00:00 prod-westeu
> sshd[2607551]: Failed password for invalid user spike from 89.37.193.207
> port 36332 ssh2 …
> *2025-10-13 03:45*.*Categories:* SSH.
> *Comment:* Attempts to access SSH server with wrong credentials
> *2025-10-13 03:44*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-12T22:39:25.215494-05:00 instance-20240522-152753
> sshd[1174004]: Invalid user add from 89.37.193.207 port 36906
> 2025-10-12T22:41:34.369775-05:00 instance-20240522-152753 sshd[1174099]:
> Invalid user casino from 89.37.193.207 port 60258
> 2025-10-12T22:42:51.042074-05:00 instance-20240522-152753 sshd[1174128]:
> Invalid user ram from 89.37.193.207 port 41632
> 2025-10-12T22:44:07.258418-05:00 instance-20240522-152753 sshd[1174177]:
> Invalid user spring from 89.37.193.207 port 58056 …
> *2025-10-13 03:42*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 12
> 22:37:54 14020 sshd[17779]: Invalid user add from 89.37.193.207 port 60594
> Oct 12 22:37:56 14020 sshd[17779]: Failed password for invalid user add
> from 89.37.193.207 port 60594 ssh2 Oct 12 22:41:05 14020 sshd[18131]:
> Invalid user casino from 89.37.193.207 port 51232 Oct 12 22:41:07 14020
> sshd[18131]: Failed password for invalid user casino from 89.37.193.207
> port 51232 ssh2 Oct 12 22:42:21 14020 sshd[18223]: Invalid user ram from
> 89.37.193.207 port 51670
> *2025-10-13 03:27*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 06:26:03 www7 sshd[2936448]: Invalid user yoga from
> 89.37.193.207 port 40622 Oct 13 06:26:06 www7 sshd[2936448]: Failed
> password for invalid user yoga from 89.37.193.207 port 40622 ssh2 Oct 13
> 06:27:15 www7 sshd[2936515]: Invalid user loc from 89.37.193.207 port 45646
> …
> *2025-10-13 03:20*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH Brute force: 55 attempts were recorded from 89.37.193.207
> 2025-10-13T03:52:41+02:00 Invalid user vpn from 89.37.193.207 port 51274
> 2025-10-13T03:56:00+02:00 Invalid user lu from 89.37.193.207 port 57956
> 2025-10-13T03:57:29+02:00 Invalid user ubuntu from 89.37.193.207 port 33686
> 2025-10-13T03:59:02+02:00 Invalid user readonly from 89.37.193.207 port
> 47532 2025-10-13T04:00:30+02:00 Invalid user ubuntu from 89.37.193.207 port
> 36710 2025-10-13T04:01:59+02:00 Invalid user scpuser from 89.37.193.207
> port 47022 2025-10-13T04:03:30+02:00 Disconnected from authenticating user
> root 89.37.193.207 port 35386 [preauth] 2025-10-13T04:05:01+02:00 Invalid
> user penis from 89.37.193.207 port 56820 2025-10-13T04:06:28+02:00
> Disconnected from authenticating user root 89.37.193.207 port 33826
> [preauth] 2025-10-13T04:07:53+02:00 Invalid user vaibhav from 89.37.193.207
> port 54540 2025-10-13T04:09:25+02:00
> *2025-10-13 03:10*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 06:09:39 www7 sshd[2935471]: Invalid user tester from
> 89.37.193.207 port 57780 Oct 13 06:09:41 www7 sshd[2935471]: Failed
> password for invalid user tester from 89.37.193.207 port 57780 ssh2 Oct 13
> 06:10:47 www7 sshd[2935577]: Invalid user braga from 89.37.193.207 port
> 42086 …
> *2025-10-13 02:59*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T02:55:53.081765+00:00 Linux04 sshd[3202249]:
> Invalid user gavin from 89.37.193.207 port 45046
> 2025-10-13T02:55:53.086273+00:00 Linux04 sshd[3202249]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T02:55:55.305639+00:00 Linux04
> sshd[3202249]: Failed password for invalid user gavin from 89.37.193.207
> port 45046 ssh2 2025-10-13T02:57:02.352056+00:00 Linux04 sshd[3205697]:
> Invalid user ftpuser from 89.37.193.207 port 39812
> 2025-10-13T02:57:02.353949+00:00 Linux04 sshd[3205697]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T02:57:04.045635+00:00 Linux04
> sshd[3205697]: Failed password for invalid user ftpuser from 89.37.193.207
> port 39812 ssh2 2025-10-13T02:58:10.885953+00:00 Linux04 sshd[3208817]:
> Invalid user fox from 89.37.193.207 port 45592
> 2025-10-13T02:58:10.887771+00:00 Linux04 sshd[3208817]:
> pam_unix(sshd:auth): authentication failure; logn …
> *2025-10-13 02:57*.*Categories:* Brute-Force, SSH.
> *Comment:* [Fail2Ban:sshd-spray] …
> *2025-10-13 02:55*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 03:54:35 server sshd[3243695]: Failed password for root
> from 89.37.193.207 port 39662 ssh2 Oct 13 03:55:49 server sshd[3243851]:
> Invalid user gavin from 89.37.193.207 port 41888 Oct 13 03:55:49 server
> sshd[3243851]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 Oct 13 03:55:49 server
> sshd[3243851]: Invalid user gavin from 89.37.193.207 port 41888 Oct 13
> 03:55:52 server sshd[3243851]: Failed password for invalid user gavin from
> 89.37.193.207 port 41888 ssh2 …
> *2025-10-13 02:55*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 13
> 02:51:04 23953 sshd[14586]: Invalid user gits from 89.37.193.207 port 46974
> Oct 13 02:51:06 23953 sshd[14586]: Failed password for invalid user gits
> from 89.37.193.207 port 46974 ssh2 Oct 13 02:54:04 23953 sshd[14825]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root Oct 13 02:54:06 23953 sshd[14825]:
> Failed password for root from 89.37.193.207 port 56406 ssh2 Oct 13 02:55:22
> 23953 sshd[14919]: Invalid user gavin from 89.37.193.207 port 41504
> *2025-10-13 02:54*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 05:51:22 www7 sshd[2933953]: Failed password for
> invalid user gits from 89.37.193.207 port 47604 ssh2 Oct 13 05:54:09 www7
> sshd[2934051]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 05:54:11 www7
> sshd[2934051]: Failed password for root from 89.37.193.207 port 57198 ssh2
> …
> *2025-10-13 02:53*.*Categories:* SSH.
> *Comment:* SSH bruteforce
> *2025-10-13 01:56*.*Categories:* Brute-Force, SSH.
> *Comment:* Brute-force SSH server detected by Fail2ban
> *2025-10-13 01:56*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T01:53:38.581194+00:00
> backup-309171561-ubuntu-4gb-fsn1-1 sshd[1745537]: pam_unix(sshd:auth):
> authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
> rhost=89.37.193.207 2025-10-13T01:53:40.716151+00:00
> backup-309171561-ubuntu-4gb-fsn1-1 sshd[1745537]: Failed password for
> invalid user vpn from 89.37.193.207 port 50922 ssh2
> 2025-10-13T01:56:22.373962+00:00 backup-309171561-ubuntu-4gb-fsn1-1
> sshd[1745588]: Invalid user lu from 89.37.193.207 port 34704 …
> *2025-10-13 01:52*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T09:52:48.622280+08:00 pbs sshd[3823865]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T09:52:50.225618+08:00 pbs
> sshd[3823865]: Failed password for invalid user vpn from 89.37.193.207 port
> 45778 ssh2 …
> *2025-10-13 01:25*.*Categories:* Brute-Force.
> *Comment:* Brute force attempt — 3 login attempts (3 failed)
> *2025-10-13 01:20*.*Categories:* Port Scan, Brute-Force, SSH.
> *Comment:* Unauthorized connection attempt detected, SSH Brute-Force
> *2025-10-13 01:07*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T02:58:21.699546+02:00 misaka-vm-s3n-2c4g-ber
> sshd[2832483]: Invalid user deploy from 89.37.193.207 port 49578
> 2025-10-13T03:03:19.835692+02:00 misaka-vm-s3n-2c4g-ber sshd[2832534]:
> Invalid user vpn from 89.37.193.207 port 48866
> 2025-10-13T03:07:31.491050+02:00 misaka-vm-s3n-2c4g-ber sshd[2832550]:
> Invalid user hadi from 89.37.193.207 port 45386 …
> *2025-10-13 01:04*.*Categories:* Brute-Force, SSH.
> *Comment:* (sshd) Failed SSH login from 89.37.193.207 (RU/Russia/-): 5 in
> the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Oct 12
> 20:01:37 13593 sshd[28991]: Invalid user deploy from 89.37.193.207 port
> 36494 Oct 12 20:01:40 13593 sshd[28991]: Failed password for invalid user
> deploy from 89.37.193.207 port 36494 ssh2 Oct 12 20:03:07 13593
> sshd[29134]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 12 20:03:09 13593
> sshd[29134]: Failed password for root from 89.37.193.207 port 33058 ssh2
> Oct 12 20:04:24 13593 sshd[29211]: Invalid user vpn from 89.37.193.207 port
> 42844
> *2025-10-13 01:04*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T01:03:04.879144+00:00 my-vps sshd[1452850]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-13T01:03:06.498186+00:00
> my-vps sshd[1452850]: Failed password for root from 89.37.193.207 port
> 37404 ssh2 2025-10-13T01:04:22.604149+00:00 my-vps sshd[1452854]: Invalid
> user vpn from 89.37.193.207 port 49358 2025-10-13T01:04:22.606953+00:00
> my-vps sshd[1452854]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207
> 2025-10-13T01:04:24.265715+00:00 my-vps sshd[1452854]: Failed password for
> invalid user vpn from 89.37.193.207 port 49358 ssh2 …
> *2025-10-13 01:03*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T03:02:40.728838+02:00 marvibiene sshd[695287]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 user=root 2025-10-13T03:02:42.387200+02:00
> marvibiene sshd[695287]: Failed password for root from 89.37.193.207 port
> 58972 ssh2 2025-10-13T03:03:56.785226+02:00 marvibiene sshd[695746]:
> Invalid user vpn from 89.37.193.207 port 50224
> 2025-10-13T03:03:56.787163+02:00 marvibiene sshd[695746]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=89.37.193.207 2025-10-13T03:03:58.546137+02:00 marvibiene
> sshd[695746]: Failed password for invalid user vpn from 89.37.193.207 port
> 50224 ssh2
> *2025-10-13 01:03*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH Brute Force Attack from 89.37.193.207 Threat Details: —
> Type: SSH Brute Force Attack — Target Service: sshd-aggressive — Target
> Server: insightvm — Detection Time: 2025-10-13 03:03:04 — Source Country:
> United Arab Emirates — Source ISP: ABCVG — Reverse DNS: Description:
> Automated SSH login attempts detected from this IP address
> *2025-10-13 01:02*.*Categories:* Brute-Force, SSH.
> *Comment:* Oct 13 00:59:03 v4bgp sshd[602510]: Failed password for
> invalid user deploy from 89.37.193.207 port 42460 ssh2 Oct 13 01:02:17
> v4bgp sshd[602617]: pam_unix(sshd:auth): authentication failure; logname=
> uid=0 euid=0 tty=ssh ruser= rhost=89.37.193.207 user=root Oct 13 01:02:19
> v4bgp sshd[602617]: Failed password for root from 89.37.193.207 port 47170
> ssh2 …
> *2025-10-13 00:09*.*Categories:* Brute-Force, SSH.
> *Comment:* 2025-10-13T00:03:28.245250+00:00 edge-con-sjc01.int.pdx.net.uk
> sshd[2269718]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=89.37.193.207 2025-10-13T00:03:30.611667+00:00
> edge-con-sjc01.int.pdx.net.uk sshd[2269718]: Failed password for invalid
> user debian from 89.37.193.207 port 59238 ssh2
> 2025-10-13T00:09:08.136277+00:00 edge-con-sjc01.int.pdx.net.uk
> sshd[2272840]: Invalid user user3 from 89.37.193.207 port 42708 …
> *2025-10-13 00:06*.*Categories:* Brute-Force, SSH.
> *Comment:* SSH brute force
> *2025-10-13 00:05*.*Categories:* Brute-Force.
> *Comment:* SSH brute force attack detected: 5 failed attempts
> *2025-10-13 00:03*.*Categories:* Brute-Force, SSH.
> *Comment:* 89.37.193.207 (RU/Russia/-), 5 distributed sshd attacks on
> account [debian] in the last 3600 secs; Ports: *; Direction: 1; Trigger:
> LF_DISTATTACK; Logs: Oct 12 19:03:28 13301 sshd[6558]: Invalid user debian
> from 202.148.55.168 port 36244 Oct 12 19:02:53 13301 sshd[6370]: Invalid
> user debian from 78.47.144.126 port 38616 Oct 12 19:02:01 13301 sshd[6128]:
> Invalid user debian from 89.37.193.207 port 52298 Oct 12 19:02:02 13301
> sshd[6128]: Failed password for invalid user debian from 89.37.193.207 port
> 52298 ssh2 Oct 12 19:02:56 13301 sshd[6370]: Failed password for invalid
> user debian from 78.47.144.126 port 38616 ssh2 IP Addresses Blocked:
> 202.148.55.168 (NL/The Netherlands/-) 78.47.144.126 (DE/Germany/
> static.126.144.47.78.clients.your-server.de)
> Please go to the InterLIR Portal Abuses page
>
> for more information and *confirm* resolving the abuse.
> *Note:* if the abuse complaint is old and the problem has already been
> resolved, please *confirm* this in the dashboard.
> Have any question so far? Visit InterLIR Support
>
> or contact us
> .
>
> Thanks,
> InterLIR
> InterLIR GmbH, Berlin
>