[tor-relays] is a good idea to run a ssh honeypot?
caioau
caioau at protonmail.com
Sun Apr 7 19:52:40 UTC 2019
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hi, I been running a relay for almost 1,5 year, and in the beginning I didn't change the default 22 ssh port but a lot of people were trying to login , no worries I only allow public key authentication.
So I was wondering if I could record the attacks, so I find this https://haas.nic.cz/ service and I'm running on my relay, is it a good idea?
Thanks
Sent with ProtonMail Secure Email.
-----BEGIN PGP SIGNATURE-----
Version: ProtonMail
Comment: https://protonmail.com
wsBcBAEBCAAGBQJcqlUBAAoJEO6drAP5JZWbZ30H/i5UlyLceKIKB1osoA16
W0x2YZWoLw8Lvifxt0ijwQSLdzU5H1CTXxHoQJLpygESdGJMbBYiOGirRnWR
nnlHqnbHHwUbZDUsxUBZTBrutwVaXXmswYyfrgZvJo17ocSaT2goaPJ0F9oK
JHpzDegTOIE6hbwUI3BnDLI6u7/gCE1ZvgrzSbIvXebZ8XKC67j0AwhKMX0Q
zUjLpXQ2eq5XLKPlOnXUc/i6xYCIoNjoBRSHX95hd2N4zy7xuZ3UhrVn0ZBi
7ZRjo77h7BeRsB3F9bA61DfgN9pM+J+R9sPU3qYClXPB/cOJmyVqVFtcT7NK
0Tz+mfbFNI8KfhN9ZHMS16Q=
=FsLz
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - caioau at protonmail.com - 0x4A76E8F4.asc
Type: application/pgp-keys
Size: 1794 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190407/77c93310/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - caioau at protonmail.com - 0x4A76E8F4.asc.sig
Type: application/pgp-signature
Size: 287 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190407/77c93310/attachment.sig>
More information about the tor-relays
mailing list