Wow! That's certainly
creative.
If I were to set up a honeypot, it would be for attack analysis. I would probably deploy
honeyd and direct unwelcome traffic there via PF. However, I've not bothered, as no attempted (and noticed) attacks so far have warranted any analysis.