[tor-relays] is a good idea to run a ssh honeypot?

caioau caioau at protonmail.com
Sun Apr 7 19:52:40 UTC 2019


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi, I been running a relay for almost 1,5 year, and in the beginning I didn't change the default 22 ssh port but a lot of people were trying to login , no worries I only allow public key authentication.

So I was wondering if I could record the attacks, so I find this https://haas.nic.cz/ service and I'm running on my relay, is it a good idea?

Thanks

Sent with ProtonMail Secure Email.
-----BEGIN PGP SIGNATURE-----
Version: ProtonMail
Comment: https://protonmail.com

wsBcBAEBCAAGBQJcqlUBAAoJEO6drAP5JZWbZ30H/i5UlyLceKIKB1osoA16
W0x2YZWoLw8Lvifxt0ijwQSLdzU5H1CTXxHoQJLpygESdGJMbBYiOGirRnWR
nnlHqnbHHwUbZDUsxUBZTBrutwVaXXmswYyfrgZvJo17ocSaT2goaPJ0F9oK
JHpzDegTOIE6hbwUI3BnDLI6u7/gCE1ZvgrzSbIvXebZ8XKC67j0AwhKMX0Q
zUjLpXQ2eq5XLKPlOnXUc/i6xYCIoNjoBRSHX95hd2N4zy7xuZ3UhrVn0ZBi
7ZRjo77h7BeRsB3F9bA61DfgN9pM+J+R9sPU3qYClXPB/cOJmyVqVFtcT7NK
0Tz+mfbFNI8KfhN9ZHMS16Q=
=FsLz
-----END PGP SIGNATURE-----

-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - caioau at protonmail.com - 0x4A76E8F4.asc
Type: application/pgp-keys
Size: 1794 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190407/77c93310/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - caioau at protonmail.com - 0x4A76E8F4.asc.sig
Type: application/pgp-signature
Size: 287 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190407/77c93310/attachment.sig>


More information about the tor-relays mailing list