This project demonstrates the deployment and analysis of an SSH honeypot to gather threat intelligence on automated attacks. The honeypot captures attacker behavior, credential attempts, and ...