Honeypots are primarily deployed for exactly the reasons you describe -- to distract would-be attackers from the real servers. Using a honeypot may give you the opportunity to detect and respond to an attack (on the bogus system) before the attackers are able to do any real harm.
Dig deeper on Network Security Monitoring and Analysis
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.