Some of the ssh tricks that I learned while automating tasks or just configuring remote services.

Everytime I need to configure ssh keys I end up on google, sometimes I find stuff that is interesting and useful, one one them is this article on how to identify who is trying to login into your service by their public keys. about ssh public keys