Have you heard of the 'Black Hole Honey pot'?

The honeypot automatically detects attacks on all ports, preventing attackers from discovering the existence of ports; Automatically ignore the attack source IP/MAC, making the attacker unable to detect the honeypot IP/MAC and making the honeypot invisible; Bypass automatic blocking attack technology and automatic isolation of compromised hosts infected with viruses. Greatly reduce customer deployment, communication, and threat disposal costs

{/volist}