This document provides an overview of honeypots, including what they are, how they are classified, examples like Honeyd and Honeynet, advantages and disadvantages. Honeypots are computer resources used to gather threat intelligence by allowing unauthorized access. They can be classified by interaction level, implementation method, and purpose. Examples discussed are Honeyd, an open source low interaction virtual honeypot, and Honeynet, a high interaction architecture using multiple honeypots on a private network. Honeypots provide benefits like collecting small high value data sets and reduced false positives, but have limitations such as a limited view of attacks.