A computer or network of computers set up to record and report attacks in the hope of detecting them before they affect important systems. The honeypot will usually have none of the normal protection such as a firewall and may run dummy services such as a database server to see what the attack can do. Often the first reports of a new type of attack comes from the evidence collected by honeypots. Attackers may attempt to detect honeypots and abort the attack.
Last updated: 2021-03-14