Honeypots only see activities that interact with them and do not capture attack, directed against other existing systems. Risk of being compromised: A Honeypot may be used as a platform to launch further attacks. At the end it would not be wrong to say that honeypots are good resources to track attackers, and its value lies in being attacked. But at the same time due to the listed disadvantages above Honeypots cannot replace any security mechanisms; they can only work to enhance the overall security.