SSH Honeypot that gathers attempted creds, IP addresses and versions. The SSH server will either issue a warning, or drop the attacker into a fake shell.
The logging now logs to an SQLite database, with schema available in database.sql
The fake shell will print a bash command not found error for every command entered, except exit. You can enable logging of these commands with the -C flag.