DecoyPulse Honeypot Triggered
High
Escalated
ALR-00015 · 2026-04-08T16:42:36Z
Description
DecoyPulse honeypot on SRV-FILE-01 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.
Alert Metadata
Endpoint Information
MITRE ATT&CK Mapping
Investigation Timeline
16:42:36
Event ingested by SOC365 Engine
16:42:39
EmilyAI triage started — correlation enrichment
16:42:41
EmilyAI confidence: 88% — escalated to human analyst
16:43:14
Alert assigned to analyst: Emma Richardson
16:43:56
Investigation started — querying SIEM and threat intelligence
16:47:20
Containment action taken — endpoint isolated
16:58:31
Alert resolved — remediation complete
Related Alerts
| ID | Time | Alert | Severity | Status | Host |
|---|---|---|---|---|---|
| ALR-00003 | 5h ago | Anomalous DNS Query | Low | False Positive | SRV-FILE-01 |
| ALR-00445 | 6h ago | Pass-the-Hash Detected | Low | Escalated | SRV-FILE-01 |
| ALR-00370 | 7h ago | Unauthorised USB Device | Low | Resolved | SRV-FILE-01 |
| ALR-00390 | 10h ago | DecoyPulse Honeypot Triggered | High | Open | SRV-SQL-01 |
| ALR-00251 | 15h ago | Kerberoasting Attempt | Medium | Investigating | SRV-FILE-01 |