Honeypot is a entrapment mechanism that provides attackers with all necessary resources needed for a successful attack. Unlike Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), which tries to stop malicious activity after detection, honeypot allows attacker to perform the attack and allows a cybersecurity researcher to get an thorough understanding of the attack patterns. Honeypot also helps in capturing the attack signatures, scripts and the payloads from the system. This chapter provides an idea about honeypots and different types of honeypots. We also describe the analysis of the attacks on honeypots deployed at IIT Kanpur.