This document discusses honeypots, which are decoy computer systems used to gather intelligence about cyber attacks. It defines honeypots and classifies them based on interaction level, implementation, and purpose. Specific honeypot tools are also outlined, including Honeyd and Honeynet. Honeyd simulates entire networks on a single host using simple functionality. Honeynet involves deploying multiple high-interaction honeypots on a private network. Advantages of honeypots include collecting high value data at low cost while limiting false alarms. Risks and fingerprinting are challenges. Overall, honeypots provide a flexible security tool for monitoring attacks.