A way more interesting and more complete honeypot is https://github.com/honeytrap/honeytrap. It combines a great list of services exposed to the internet and is very extendable. Currently development has a somewhat lower priority, but in the near future, it'll be ramped up.
Developing on an ESP8266 is completely different than a RasPi Zero. If you want a challenge, and want to write code that can run in 80KB of RAM and have the code and all of its dependencies fit in 4MB of flash, then that’s part of the reason why microcontrollers are popular (also because a lot of them are easy to get going with).
I've always been amazed by the power of these little ESP chips. I'm actually really curious to see what outside the box use cases the ESP 8266 and the ESP 32 will have in the future.
I used to run a Kippo[1] honeypot on port 22. I'd regularly see automated intrusion attempts, often followed up by users manually interacting with the server (and slowly coming to realize that it was fake). Nowadays I expect the exploitation process is typically much more automatic, so it'd be less interesting to watch.
I understand your misconceptions about this working. It really just depends on if it appears to be vulnerable enough to scanners, and whether people actually bother to take interest. I guess you could say that my "project" is more of and experiment in how hackers go about finding vulnerable devices. Who knows, maybe hackers don't take interest in vulnerable telnet services anymore (they probably don't), but thats okay, this was fun while it lasted. I'll leave the memes on the readme.
Hey- if you are the author, I want to say I support what you are doing. We need more projects like this. But when I read the source, looks pretty lean to me in terms of follow on functionality. Would love to help you expand on this.