Back to Glossary
Networking
What is Honeypot?
A decoy system designed to attract attackers, allowing security teams to study attack methods and detect intrusions.
Honeypots are intentionally vulnerable systems deployed to lure and observe attackers.
Types
- Low-interaction: Simulates services on open ports, logs connection attempts
- High-interaction: Full operating system that attackers can explore
- Honeynets: Networks of honeypots simulating an entire infrastructure
- Honey tokens: Fake credentials planted in databases to detect breaches
Privacy Use
- Detect if your network is being probed
- Identify compromised devices on your network (they'll try to connect to the honeypot)
- Some password managers include "canary" entries that alert if accessed
Caution
Operating a honeypot means intentionally attracting attackers. Ensure it's properly isolated so a compromised honeypot can't be used to attack other systems.
Related Terms
Have more questions?
Use our guided flow to get the right next privacy step for Honeypot.
Open Guided Flow