This document discusses different types of honeypots used to detect unauthorized access and malware. It provides statistics on attacks detected by the Dionaea, Kippo, and Honeydrive honeypots, including top attacking IP addresses and malware captured. Interactive portions allow the reader to access honeypot systems to observe attacks firsthand. The author analyzes the data collected and shares insights into cyber threats and how honeypots can help security analysts.