Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:55:54 UTC

DecoyPulse Honeypot Triggered

High Escalated
ALR-00015 · 2026-04-08T16:42:36Z

Description

DecoyPulse honeypot on SRV-FILE-01 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.

Alert Metadata

Alert ID
ALR-00015
Timestamp
2026-04-08T16:42:36Z
Severity
High
Status
Escalated
Detection Source
Firewall
Assigned Analyst
Emma Richardson

Endpoint Information

Hostname
SRV-FILE-01
User Account
f.hall
Source IP
103.38.216.212
Destination IP
10.1.223.200
Origin Country
RO Romania

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1018
Reference
attack.mitre.org/techniques/T1018

Investigation Timeline

16:42:36 Event ingested by SOC365 Engine
16:42:39 EmilyAI triage started — correlation enrichment
16:42:41 EmilyAI confidence: 88% — escalated to human analyst
16:43:14 Alert assigned to analyst: Emma Richardson
16:43:56 Investigation started — querying SIEM and threat intelligence
16:47:20 Containment action taken — endpoint isolated
16:58:31 Alert resolved — remediation complete

Related Alerts

ID Time Alert Severity Status Host
ALR-00003 5h ago Anomalous DNS Query Low False Positive SRV-FILE-01
ALR-00445 6h ago Pass-the-Hash Detected Low Escalated SRV-FILE-01
ALR-00370 7h ago Unauthorised USB Device Low Resolved SRV-FILE-01
ALR-00390 10h ago DecoyPulse Honeypot Triggered High Open SRV-SQL-01
ALR-00251 15h ago Kerberoasting Attempt Medium Investigating SRV-FILE-01