Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:50:27 UTC

Rogue DHCP Server

Low Open
ALR-00236 · 2026-04-06T13:04:32Z

Description

Rogue DHCP server detected on VLAN 10 from WS-LAP-010. Offering IPs in unexpected range. SOC365 Engine quarantined the device.

Alert Metadata

Alert ID
ALR-00236
Timestamp
2026-04-06T13:04:32Z
Severity
Low
Status
Open
Detection Source
SOC365 Engine
Assigned Analyst
EmilyAI (auto)

Endpoint Information

Hostname
WS-LAP-010
User Account
p.thomas
Source IP
185.127.220.164
Destination IP
10.3.63.205
Origin Country
US United States

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1557.003
Reference
attack.mitre.org/techniques/T1557.003

Investigation Timeline

13:04:32 Event ingested by SOC365 Engine
13:04:36 EmilyAI triage started — correlation enrichment
13:04:38 EmilyAI confidence: 92% — escalated to human analyst
13:04:48 Alert assigned to analyst: EmilyAI (auto)
13:06:03 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00183 9h ago Failed MFA Challenge Medium False Positive WS-LAP-010
ALR-00072 16h ago Rogue DHCP Server Informational Open WS-PC-002
ALR-00460 18h ago Rogue DHCP Server Informational False Positive SRV-APP-01
ALR-00411 21h ago Failed MFA Challenge Low False Positive WS-LAP-010
ALR-00322 21h ago Shadow IT Discovery Low Investigating WS-LAP-010