Lure possible attackers into a trap with a Kali Linux honeypot. One thing many security experts depend on is the honeypot. What is a honeypot? Simply put, they are systems put in place to mimic particular targets of cyberattacks. With a honeypot in place, admins can detect and log attacks to certain services as well as the originating IP address of said attack.
Link: How to quickly deploy a honeypot with Kali Linux
via www.techrepublic.com