#config setprop sshd Port 2222
#signal-event remoteaccess-update
Pfloor, Should read :
#config setprop sshd TCPPort 2222
#signal-event remoteaccess-update
warren
Yes, you are correct. Sorry it was a bit late when I posted.
But using keys should solve his problem because he can't be hacked trough ssh (unless they manage to get a key).
The OP was also complaining about hundreds (maybe even thousands) of failed login attempts. Using keys will not solve that part of his problem. The only way to quiet the logs is to use a different port.
Another good thing will happen if you change the port. Most hackers just pick IP adresses randomly. If port 22 is stealth, then the hacker's script just moves on to the next IP adress and leaves you alone. This will also give you back the bandwidth (although minor) that the hackers were eating up.
I use keys and a different port myself. My sshd logs went from 1000 failed attempts per day to NONE. Yes that is correct, I have had ZERO ssh hacking attempts in over 3 months. It probably isn't any more secure to change the port when using keys but it sure is a whole lot quieter on the server.