With the honeypot set up we can see the successful login attempts, but not much is happening appart from strange SSH-Keys being added. This is likely due to the honeypot being detected as such by the malware. The honeypot is not covert enough and is lacking features to log the passwords and commands that were attemped. In the following we'll enhance it.
Let's see what the cat dragged in. With the Honeypot Qemu machine working we can analyse the logs.
After detecting failed login attempts at my SSH server let's setup a fake SSH server (a honeypot) and see what these bot are upto.
My SSH-Server has been receiving a lot of failed login attempts. Let's see where they come from and what traces the log files contain.