A Honeypot is a software based security device, deployed to attract hackers by displaying services and open ports which are potentially vulnerable. While the attackers are diverted, their activities can then be monitored and analysed to identify current attack methods and trends. A low-interaction Honeypot called Dionaea was chosen for this project because it can simulate services while preventing an attacker from gaining full control. Results were collected over the six week period of the experiment. The logged information of the observed attacks was analysed and compared with current vulnerabilities, the locations where the attacks were originating from and the time of day at the originating site. A profile of individual attackers can then be built to gain an insight into the current attack trends in order to improve network defences.