Honeypots are decoy computers used to attract the attention of cyber-attackers.

To an attacker, the honeypot seems like a normal part of the computer system, but it’s really segregated from the main system.

Honeypots provide a way to deflect attackers from the real network or monitor their activities.

Malware honeypots and spam-traps are two kinds of honeypot.