This document provides an overview of honey pots and the Kippo honey pot in particular. It discusses why honey pots are used for threat intelligence gathering, types of honey pots including low and high interaction, and how Kippo works as a medium interaction SSH honey pot. Specific findings from a Kippo honey pot are presented, including login attempts, successes when default credentials were leaked, and visualizations of attack data with Kippo-Graph. Resources for downloading and hosting Kippo are also listed.