Honeypot

Security Operations 🛡️ Difficulty: premium

Definition

A honeypot is a decoy system or service designed to attract attackers, detect unauthorized activity, and study malicious behavior without risking actual assets.

Examples

  • A security team sets up a fake login portal that logs IP addresses of anyone attempting to access it.
  • An organization deploys a vulnerable server in a segmented network to monitor attack patterns and techniques.

Overview

A honeypot is a deliberately deployed decoy system or service intended to lure attackers and detect unauthorized access attempts. It mimics a real target — such as a server, database, or web application — but is isolated from critical systems. Its main goal is to attract malicious actors, log their activity, and gather intelligence without endangering actual infrastructure.

Honeypots help security teams understand attacker methods, identify new exploits, and detect suspicious behavior that may not trigger traditional alerts. They can be used for research, early warning, or as part of deception strategies to slow down intruders and reduce the success of attacks.

Open the interactive lesson Browse more topics

Tip: The interactive version includes progress tracking, decks, and premium deep dives.