Was doing routine surveillance and found something good
Remember that silly little SSH honeypot SDSC set up?
Okay lemme just get this off of my chest, what a sorry excuse for a honeypot. Are you kidding me? This is your attempt at fooling us? Literally anything else would be better than this. If you are going for medium interaction, at least simulate some sort of network activity and put believable files in there. "The SDSC Banana Gun"? Really? I can't believe you guys are getting paid for this.
Anyways, I found an endpoint for viewing activity on the honeypot and these idiots made it public. You can even filter by IP. Here's the endpoint:
isza.org/honeypot/secrets?ip=
It'd be funny to see what the schmuck's who fell for it tried to do on there...
#token- <safe_and_secure_bungle>#