Oct 9 23:15:25 ns311733 sshd[16101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Oct 9 23:15:27 ns311733 sshd[16101]: Failed password for root from 14.63.167.192 port 55740 ssh2
Oct 9 23:15:28 ns311733 sshd[16101]: Received disconnect from 14.63.167.192 port 55740:11: Bye Bye [preauth]
Oct 9 23:15:28 ns311733 sshd[16101]: Disconnected from 14.63.167.192 port 55740 [preauth]
Oct 9 23:15:33 ns311733 sshd[16105]: Accepted password for root from 167.114.63.99 port 51958 ssh2
Oct 9 23:15:33 ns311733 sshd[16105]: pam_unix(sshd:session): session opened for user root by (uid=0)
At the end they finally got in. How the hell do they brute force the password this fast? It's unbelievable, it's many characters long.