This document summarizes attacks on a Linux honeypot connected to the internet over time. It describes common exploits attempted including longstanding vulnerabilities in RPC statd and WU-FTPD. It also outlines payloads left by attackers like rootkits and tools and provides examples of infiltration incidents where attackers used compromised systems for IRC bots, flooding attacks, and expanding attacks to other systems.