Honeypots are digital decoys that are designed to attract hackers in order to monitor their behavior and gather information. This document outlines different types of honeypots, including production honeypots used for real-time protection and research honeypots for educational purposes. It also describes various honeypot network configurations and diagrams their connections. The advantages of honeypots are their ability to capture new tools and tactics, while limitations include only monitoring direct interactions and not neighboring systems. The future plans are to make honeypot deployment and management easier through a bootable CD.