None here. (If I understand correctly, using the exploit would generate many connections and nothing else.) Not even authentication attempts. Just a few IPs running commands (buildinfo, listDatabases, ismaster, etc.) without prior authentication.
They seem to be looking for databases exposed to the Internet and not protected in any way? Unless something's wrong with the honeypot...