Using this trap, the goal is to get some information about who would be attacking the system, creating a defense mechanism against future attacks.
For this, the honeypot will dress up as a defenseless file to attract the attack directly to it.
Generally, in large corporations, the honeypot is structured as if it were a personal customer database or even a financial information management system. That is, the most sensitive part of any company.
When the attacker is lured and actually arrives at the honeypot, its origin location can be traced and the problem solved. Because it is more of an environment than a system of direct action, it cannot be configured or customized like a firewall, for example