Now-a-days lot of people penetrating the network. Sometimes threatening is done by the open ports also. In this paper, the authors presented basic concept of honey pot system. In this paper it is defined what is honey pot, and different types of honey pot, history of honey pot, what are different ways to implement the honey pot if according to the consideration of level of attack there are low interactions and high interactions. There are so many drawbacks of low interaction and high interaction that is resolved in hybrid honey pot system.