This document discusses various honeypot tools and the findings from deploying them. It begins with an introduction to honeypots and what they are used for. It then discusses specific low and high interaction honeypots like Dionaea, Kippo, Amun and Thug. For each honeypot, it provides statistics on IP addresses, login attempts, files uploaded and malware captured. It also analyzes these findings through tools like Wireshark and virus total. Overall, the document aims to educate about honeypot tools and share the results from the author's own honeypot deployments.