Honeypots are decoy computers used to attract the attention of cyber-attackers.
To an attacker, the honeypot seems like a normal part of the computer system, but it’s really segregated from the main system.
Honeypots provide a way to deflect attackers from the real network or monitor their activities.
Malware honeypots and spam-traps are two kinds of honeypot.