These are fake machines/victims designed for an attacker to take over.
They are monitored so that we can see what techniques an attacker will use.
Multiple honeypots form a Honeynet
These are fake machines/victims designed for an attacker to take over.
They are monitored so that we can see what techniques an attacker will use.
Multiple honeypots form a Honeynet