With the rapid increase of technology throughout the world, there has alsobeen an equally rapid increases in its abuse. Currently, security professionalmade some attempts to learn about attacker, however these attempts were limitedin effort and scope. They emphasis on the targeted vulnerability and howthe exploit took advantage of that vulnerability. However, very little attentionwas focused on the attackers themselves. IT is necessary to study the black-hatcommunity’s tools, tactics, and motive and then sharing any lessons learned.The more you know about your enemies, the better chance you have of defendingyourself against them and defeating them. A honeynet is a networkset up with intentional vulnerabilities; its purpose is to invite attack, so thatan attacker’s activities and methods can be studied and that information usedto increase network security. This paper will collect and analyse the attackersactivity, through the honeynet network and normal secured system and it willidentify if there is new attackers activities, that are not detected by the currentsecurity tool are detected.