Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:57:23 UTC

Rogue DHCP Server

Low False Positive
ALR-00090 · 2026-04-08T05:44:55Z

Description

Rogue DHCP server detected on VLAN 10 from WS-PC-003. Offering IPs in unexpected range. Network IDS quarantined the device.

Alert Metadata

Alert ID
ALR-00090
Timestamp
2026-04-08T05:44:55Z
Severity
Low
Status
False Positive
Detection Source
Network IDS
Assigned Analyst
EmilyAI (auto)

Endpoint Information

Hostname
WS-PC-003
User Account
c.williams
Source IP
194.21.62.203
Destination IP
10.3.115.181
Origin Country
DE Germany

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1557.003
Reference
attack.mitre.org/techniques/T1557.003

Investigation Timeline

05:44:55 Event ingested by SOC365 Engine
05:44:56 EmilyAI triage started — correlation enrichment
05:45:07 EmilyAI confidence: 89% — escalated to human analyst
05:45:30 Alert assigned to analyst: EmilyAI (auto)
05:46:20 Investigation started — querying SIEM and threat intelligence
05:48:57 Containment action taken — endpoint isolated
06:01:33 Alert resolved — remediation complete

Related Alerts

ID Time Alert Severity Status Host
ALR-00235 2h ago Suspicious Scheduled Task High Open WS-PC-003
ALR-00408 4h ago Tor Exit Node Connection Informational Escalated WS-PC-003
ALR-00103 5h ago Data Exfiltration Attempt Low Open WS-PC-003
ALR-00214 19h ago Rogue DHCP Server Low Resolved SRV-DC-01
ALR-00160 1d ago DecoyPulse Honeypot Triggered Low Escalated WS-PC-003