How to detect honeypots on internal network?

I work at a firm where there are multiple honeypots deployed, So these honeypots detect even if you run a simple ping sweep. How do pentesters detect/avoid honeypots?

There are approx 250 Network decoys sitting on a network.

This topic was automatically closed 3 days after the last reply. New replies are no longer allowed.