Honey Pot

A deliberate vulnerability and/or fake data intended to attract malicious actors. Generally monitored, a honeypot is often used as an early warning sign of malicious activity. Sometimes used as a decoy. Sometimes used by security firms and researchers to gather intelligence.