This document provides a review of honeypots, which are specially designed networks that mimic real networks to attract and monitor hackers. It discusses different types of honeypots including based on interaction level (high, medium, low), deployment categories (production, research), and deployment modes (deception, intimidation, reconnaissance). Three open source honeypots - HoneyBOT, KF Sensors, and Valhala Honeypot - are analyzed based on parameters like response time, complexity, and detection/prevention abilities. Honeypots are found to be an effective security measure when combined with firewalls and intrusion detection systems to detect and prevent threats while learning about hacking techniques.