OK, here is one of today's douchebags (oops, can I say that in here? he's from the cortesuprema...oooooo):
Oct 6 09:37:47 centos514899 sshd[18167]: User root from
www.cortesuprema.gov.ec not allowed because not listed in AllowUsers
Oct 6 09:37:47 centos514899 sshd[18168]: input_userauth_request: invalid user root
Oct 6 09:37:47 centos514899 sshd[18168]: Received disconnect from 190.152.14.6: 11: Bye Bye
Oct 6 09:37:53 centos514899 sshd[18169]: User root from
www.cortesuprema.gov.ec not allowed because not listed in AllowUsers
Oct 6 09:37:53 centos514899 sshd[18170]: input_userauth_request: invalid user root
Oct 6 09:37:53 centos514899 sshd[18170]: Received disconnect from 190.152.14.6: 11: Bye Bye
Oct 6 09:37:54 centos514899 sshd[18171]: User root from
www.cortesuprema.gov.ec not allowed because not listed in AllowUsers
Oct 6 09:37:54 centos514899 sshd[18172]: input_userauth_request: invalid user root
Oct 6 09:37:54 centos514899 sshd[18172]: Received disconnect from 190.152.14.6: 11: Bye Bye
Oct 6 09:37:57 centos514899 sshd[18173]: User root from
www.cortesuprema.gov.ec not allowed because not listed in AllowUsers
Oct 6 09:37:57 centos514899 sshd[18174]: input_userauth_request: invalid user root
Oct 6 09:37:58 centos514899 sshd[18174]: Received disconnect from 190.152.14.6: 11: Bye Bye
Oct 6 09:38:00 centos514899 sshd[18176]: User root from
www.cortesuprema.gov.ec not allowed because not listed in AllowUsers
Oct 6 09:38:00 centos514899 sshd[18177]: input_userauth_request: invalid user root
Oct 6 09:38:00 centos514899 sshd[18177]: Received disconnect from 190.152.14.6: 11: Bye Bye
Fail2Ban isn't catching this guy in the sshd-iptables jail...I have maxRetry set to 3 and here the guy is attempting at least 5 entries in 15 secs. Here is the default filter for sshd-iptables--looks like line 5/6 should be catching the "invalid user root" and "AllowUsers" log entries no problem:
failregex = ^%(__prefix_line)s(?:error: PAM: )?Authentication failure for .* from <HOST>\s*$
^%(__prefix_line)s(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\s*$
^%(__prefix_line)sFailed (?

assword|publickey) for .* from <HOST>(?: port \d*)?(?: ssh\d*)?$
^%(__prefix_line)sROOT LOGIN REFUSED.* FROM <HOST>\s*$
^%(__prefix_line)s[iI](?:llegal|nvalid) user .* from <HOST>\s*$
^%(__prefix_line)sUser \S+ from <HOST> not allowed because not listed in AllowUsers$
^%(__prefix_line)sauthentication failure; logname=\S* uid=\S* euid=\S* tty=\S* ruser=\S* rhost=<HOST>(?:\s+user=.*)?\s*$
^%(__prefix_line)srefused connect from \S+ \(<HOST>\)\s*$
^%(__prefix_line)sAddress <HOST> .* POSSIBLE BREAK-IN ATTEMPT!*\s*$
^%(__prefix_line)sUser \S+ from <HOST> not allowed because none of user's groups are listed in AllowGroups$