Sorry, I realised that each request has an ID (am i right??) so here is the log of all sshd[18027] requests:
Mar 17 08:45:08 localhost sshd[18027]: debug1: rexec start in 5 out 5 newsock 5 pipe 8 sock 9
Mar 17 08:45:08 localhost sshd[18027]: debug1: inetd sockets after dupping: 3, 3
Mar 17 08:45:08 localhost sshd[18027]: Connection from ###[MY IP]### port ###
Mar 17 08:45:08 localhost sshd[18027]: debug1: Client protocol version 2.0; client software version PuTTY_Local:_Nov_29_2012_23:00:29
Mar 17 08:45:08 localhost sshd[18027]: debug1: no match: PuTTY_Local:_Nov_29_2012_23:00:29
Mar 17 08:45:08 localhost sshd[18027]: debug1: Enabling compatibility mode for protocol 2.0
Mar 17 08:45:08 localhost sshd[18027]: debug1: Local version string SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7
Mar 17 08:45:10 localhost sshd[18027]: debug1: PAM: initializing for "root"
Mar 17 08:45:10 localhost sshd[18027]: debug1: PAM: setting PAM_RHOST to "####.com.au"
Mar 17 08:45:10 localhost sshd[18027]: debug1: PAM: setting PAM_TTY to "ssh"
Mar 17 08:45:10 localhost sshd[18027]: Failed none for root from ###[MY IP]### port 49355 ssh2
Mar 17 08:45:10 localhost sshd[18027]: debug1: PAM: password authentication accepted for root
Mar 17 08:45:10 localhost sshd[18027]: debug1: do_pam_account: called
Mar 17 08:45:10 localhost sshd[18027]: Accepted password for root from ###[MY IP]### ###[MY PORT]### ssh2
Mar 17 08:45:10 localhost sshd[18027]: debug1: monitor_child_preauth: root has been authenticated by privileged process
Mar 17 08:45:10 localhost sshd[18027]: debug1: PAM: establishing credentials
Mar 17 08:45:10 localhost sshd[18027]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 17 08:45:10 localhost sshd[18027]: debug1: Entering interactive session for SSH2.
Mar 17 08:45:10 localhost sshd[18027]: debug1: server_init_dispatch_20
Mar 17 08:45:11 localhost sshd[18027]: debug1: server_input_channel_open: ctype session rchan 256 win 2147483647 max 16384
Mar 17 08:45:11 localhost sshd[18027]: debug1: input_session_request
Mar 17 08:45:11 localhost sshd[18027]: debug1: channel 0: new [server-session]
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_new: session 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_open: channel 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_open: session 0: link with channel 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: server_input_channel_open: confirm session
Mar 17 08:45:11 localhost sshd[18027]: debug1: server_input_channel_req: channel 0 request
simple@putty.projects.tartarus.org reply 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_by_channel: session 0 channel 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_input_channel_req: session 0 req
simple@putty.projects.tartarus.orgMar 17 08:45:11 localhost sshd[18027]: debug1: server_input_channel_req: channel 0 request subsystem reply 1
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_by_channel: session 0 channel 0
Mar 17 08:45:11 localhost sshd[18027]: debug1: session_input_channel_req: session 0 req subsystem
Mar 17 08:45:11 localhost sshd[18027]: subsystem request for sftp
Mar 17 08:45:11 localhost sshd[18027]: debug1: subsystem: exec() internal-sftp