This document summarizes a project that analyzes malicious activity using honeypots. The project involves deploying honeypots to monitor and record malicious activity and generate threat intelligence. It will provide a web application where users can view threat intelligence reports, the malicious activity of specific IP addresses, and visual aids like graphs and charts. The document includes block diagrams of the system architecture and components, use case diagrams, and data flow diagrams.