Honeypot Background Honeypots are systems simulating operating system services that are expected to be compromised. As all data leaving or entering a honeypot is collected to gain insight into new attack methods. Different types of Honeypots: low-interaction: a few services are emulated not the whole operating system. high-interaction: a complete operating system is emulated. physical: the honeypot is the same as the machine it runs on. virtual: no physical system corresponds to the honeypot.