These are fake machines/victims designed for an attacker to take over. They are monitored so that we can see what techniques an attacker will use. Multiple honeypots form a Honeynet