Hacky New Year Everyone

Indeed. The example above actually was running on a non-standard port. While it reduces the number of connection attempts initially, sooner or later the hackers will find it on a port scan and then you’ll know about it. I think at that point it goes into some sort of secret hacker “list of ssh servers” on the darknet, and gets passed around.

2 Likes