In conclusion, I realized that a honeypot is useful to understand attack vectors and attacker’s behavior. Although I deployed it on my home network, there are more bots and attackers have tried to access my home network. Likewise, medium and big size companies are exposure to these kind of attacks more than a home user. It is useful, since a security administrator can observe attacker behaviors, be aware of and keep away from weak usernames and passwords. By updating malicious IP addresses on a blacklist, they are blocked for dangerous, and bandwidth consuming connections. In addition that, A attacker can scan open ports using nmap, hping3, netcat however, default port numbers can be changed for obfuscation. It will be a supplementary mitigation technique.