Introduction Honeypots are a security resource whose value lies in being probed, attacked, or compromised. Intrusion detection and response. Network decoy to deter from real targets. Network sensor. Instrument unused address space. All data leaving or entering a honeypot is collected for forensic analysis. Honeypots have a low false positive rate. All connections are suspicious.