• Some software publishers will add ping back features to their apps, and e-books often contain digital watermarks that are unique to the account that originally purchased the product, so they can track pirated copies back the source. In addition to honeypots, law enforcement organizations like the FBI could seed the internet with "poison" credit card numbers and login credentials, which would then trigger an alert then used in the wild. Even if the sting only led to the arrest of individuals downstream who purchase stolen data (as opposed the ring leaders who actually break into databases), it would ultimately sour the market for stolen data and possibly discourage thieves from seeing it as a worth-the-risk profit making enterprise.

    Also, that documentary TV series "To Catch A Predator", where police use fake chat room posts or adds to lure sexual predators who think they're meeting up with a teen; I guess that would be an example of an internet "honeypot" operation.  🙂
    https://youtu.be/zJIlftta6fk

    "Do not seek to follow in the footsteps of the wise. Instead, seek what they sought." - Matsuo Basho