Information Security, as the word says, has always meant securing assets and providing controls and procedures to resist damage or potentialimpact on the system(s) under consideration. This definition as isunderstood in security circles has various potential inferences and istypically understood in the defensive sense. Protect the network, protect the server, protect the logs, the list never ends. Honeypot is a security mechanism whose value lies in unauthorized or illicit use of that resource.It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. They are a highly flexible tool that comes in many shapes and Sizes. However, this paper examines the different types of honeypot and their levels of interaction with the attacker. This paper attempts to examine a honeypot environment using Tcpdump packet sniffer through SSH client.