Sure, here you go, connect from a local client, with stored password, including a manual password attempt.
Log level changed to Verbose.
08:53:26.728 Info SSH: Session 1: Connection closed by the remote host.
08:53:26.728 Info Server: Session 1: Closed connection from 127.0.0.1:2831.
08:53:28.400 Debug Server: Accepted connection from 127.0.0.1:2853.
08:53:28.400 Info Server: Session 2: Started on connection from 127.0.0.1:2853.
08:53:28.400 Debug SSH: Session 2: Local SSH version: SSH-2.0-RebexSSH_5.0.8020.0
08:53:28.416 Debug SSH: Session 2: Remote SSH version: SSH-2.0-WinSCP_release_5.19.6
08:53:28.416 Debug SSH: Session 2: Performing algorithm negotiation and key exchange.
08:53:28.416 Verbose SSH: Session 2: Sent packet SSH_MSG_KEXINIT (1031 bytes).
08:53:28.416 Verbose SSH: Session 2: Received packet SSH_MSG_KEXINIT (1177 bytes).
08:53:28.416 Debug SSH: Session 2: Performing key exchange using diffie-hellman-group-exchange-sha256 with ssh-rsa.
08:53:28.416 Verbose SSH: Session 2: Received packet SSH_MSG_PACKET34 (13 bytes).
08:53:28.416 Verbose SSH: Session 2: Sent packet SSH_MSG_KEXDH_REPLY (1034 bytes).
08:53:28.853 Verbose SSH: Session 2: Received packet SSH_MSG_PACKET32 (517 bytes).
08:53:31.603 Verbose SSH: Session 2: Sent packet SSH_MSG_PACKET33 (1075 bytes).
08:53:31.603 Verbose SSH: Session 2: Sent packet SSH_MSG_NEWKEYS (1 bytes).
08:53:31.603 Debug SSH: Session 2: Cipher info: SSH 2.0, diffie-hellman-group-exchange-sha256, ssh-rsa, aes256-ctr/aes256-ctr, hmac-sha2-256/hmac-sha2-256
08:53:32.119 Verbose SSH: Session 2: Received packet SSH_MSG_NEWKEYS (1 bytes).
08:53:32.119 Debug SSH: Session 2: Key exchange finished.
08:53:32.119 Verbose SSH: Session 2: Received packet SSH_MSG_SERVICE_REQUEST (17 bytes).
08:53:32.119 Debug SSH: Session 2: Performing authentication.
08:53:32.119 Verbose SSH: Session 2: Sent packet SSH_MSG_SERVICE_ACCEPT (17 bytes).
08:53:32.134 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_REQUEST (37 bytes).
08:53:32.134 Debug SSH: Session 2: Starting authentication as 'tester' for 'ssh-connection'.
08:53:32.134 Verbose SSH: Session 2: Sent packet SSH_MSG_USERAUTH_FAILURE (35 bytes).
08:53:32.134 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_REQUEST (61 bytes).
08:53:32.134 Verbose SSH: Session 2: Sent packet SSH_MSG_PACKET60 (32 bytes).
08:53:32.150 Verbose SSH: Session 2: Received packet SSH_MSG_IGNORE (152 bytes).
08:53:32.150 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_INFO_RESPONSE (17 bytes).
08:53:32.150 Info Server: Session 2: Authentication for 'tester' failed.
08:53:32.150 Debug SSH: Session 2: Response from 'tester' not accepted.
08:53:32.150 Verbose SSH: Session 2: Sent packet SSH_MSG_USERAUTH_FAILURE (35 bytes).
08:53:32.166 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_REQUEST (61 bytes).
08:53:32.166 Verbose SSH: Session 2: Sent packet SSH_MSG_PACKET60 (32 bytes).
08:53:37.103 Verbose SSH: Session 2: Received packet SSH_MSG_IGNORE (152 bytes).
08:53:37.103 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_INFO_RESPONSE (17 bytes).
08:53:37.103 Info Server: Session 2: Authentication for 'tester' failed.
08:53:37.103 Debug SSH: Session 2: Response from 'tester' not accepted.
08:53:37.103 Verbose SSH: Session 2: Sent packet SSH_MSG_USERAUTH_FAILURE (35 bytes).
08:53:37.119 Verbose SSH: Session 2: Received packet SSH_MSG_USERAUTH_REQUEST (61 bytes).
08:53:37.119 Verbose SSH: Session 2: Sent packet SSH_MSG_PACKET60 (32 bytes).