Honeypot

There is an ssh server running on port 22 which is slightly modified to track the credentials of each login, no matter if successful or not (do not bother, there are no valid users). The main goal is to gather some insight on the credentials used by bots on the internet to brute force ssh. Below you can see them in the format "Source address, username, password". You can get the log file itself at /honeypot/logs/sshd.log.

Here is the patch for openssh that will make it work that way. It has a hard coded location for the log file.