Answer:
Honeypots.
Step-by-step explanation:
Honeypot:- It is a system that is attached to the network it sets itself up as a decoy to tempt cyber attackers and to deflect,detect attempts in an attempt to have unauthorized access to the systems.
It's function is to show itself as a target for attackers on the internet and to collect details and inform the defenders of any efforts to access honeypot by an unauthorized user.
So we conclude that honeypot is the answer.