A computer honeypot is a cybersecurity tool designed to act as a decoy system, intentionally set up to attract cyberattackers by mimicking a legitimate and vulnerable computer or network resource. The primary purposes of a honeypot are to: Lure attackers away from real, valuable systems and to detect, deflect, or study unauthorized or malicious activity. They can also be used to gather intelligence about attacker methods, tools, and motivations.

Honeypots are configured to look like genuine systems, often running the same operating systems, applications, and services as real assets. They may contain fake data, open ports, or deliberately weak security measures to entice attackers. Once an attacker interacts with a honeypot, security professionals can monitor, log, and analyze their actions in a controlled environment. This provides valuable insights into current cyber threats and helps improve overall security defenses.

Synonyms:
honeypot