Honey Pots and Honey Nets
Meant to attract hackers, make to look similar to production as a decoy, can be setup with monitoring and alerts so you know a hacker is present on an internal network. Should be isolated from true production systems and data.
Here is the link to all the honey pots:
https://www.kitploit.com/2015/
Here is a link to Tpot:
https://dtag-dev-sec.github.
Guide to setting up ELK stack, if you would like to set up individual Honeypots and still have the nice dashboard:
https://logz.io/learn/