Honeypots are devices deployed to lure and proactively detect attackers before they attempt to exploit weaknesses of real network systems. It is a decoy system that lookalike sensitive system to the attacker. Nevertheless, it is there just to lure the attacker away from our legitimate systems. These isolated enticement networks are established to investigate, characterize and model attackers’ behavior and thereby proactively deploy safeguards.
The purpose of a honeypot is to trap hackers and closely watch their moves as they try to unleash their attack techniques. Honeynets are network of Honeypots.