A security resource whose purpose is to attract attackers and monitor or study their behavior. Honeypots can serve as a kind of trap for cybercriminals by posing as potentially valuable targets such as entire network systems, databases, or even specific information. They are designed to look real enough to attract an attacker's attention, but isolated enough to prevent intrusion into real systems. By monitoring activity on a honeypot, security analysts can study the tactics, techniques and procedures (TTPs) of cybercriminals, identify their IP addresses and potentially take preventative measures for their real systems.