Watch this video on YouTube
What command should be executed to simulate a service on a honeypot that logs attempts of SSH brute force attacks?