Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:50:55 UTC

DecoyPulse Honeypot Triggered

Low Investigating
ALR-00216 · 2026-04-11T23:00:17Z

Description

DecoyPulse honeypot on WS-LAP-011 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.

Alert Metadata

Alert ID
ALR-00216
Timestamp
2026-04-11T23:00:17Z
Severity
Low
Status
Investigating
Detection Source
Email Gateway
Assigned Analyst
EmilyAI (auto)

Endpoint Information

Hostname
WS-LAP-011
User Account
l.johnson
Source IP
185.140.220.112
Destination IP
10.0.23.90
Origin Country
RO Romania

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1018
Reference
attack.mitre.org/techniques/T1018

Investigation Timeline

23:00:17 Event ingested by SOC365 Engine
23:00:21 EmilyAI triage started — correlation enrichment
23:00:30 EmilyAI confidence: 88% — escalated to human analyst
23:00:42 Alert assigned to analyst: EmilyAI (auto)
23:01:03 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00069 2h ago Insider Threat Indicator Medium Open WS-LAP-011
ALR-00157 17h ago Brute Force SSH Low Open WS-LAP-011
ALR-00316 23h ago DecoyPulse Honeypot Triggered Low Open SRV-MAIL-01
ALR-00313 1d ago Shadow IT Discovery Medium Investigating WS-LAP-011
ALR-00372 1d ago DecoyPulse Honeypot Triggered Critical Investigating WS-PC-001