Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 15:26:20 UTC

DecoyPulse Honeypot Triggered

Medium Open
ALR-00270 · 2026-04-12T08:56:28Z

Description

DecoyPulse honeypot on SRV-APP-01 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.

Alert Metadata

Alert ID
ALR-00270
Timestamp
2026-04-12T08:56:28Z
Severity
Medium
Status
Open
Detection Source
Endpoint Agent
Assigned Analyst
Sarah Chen

Endpoint Information

Hostname
SRV-APP-01
User Account
j.smith
Source IP
45.246.148.74
Destination IP
10.2.180.227
Origin Country
US United States

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1018
Reference
attack.mitre.org/techniques/T1018

Investigation Timeline

08:56:28 Event ingested by SOC365 Engine
08:56:30 EmilyAI triage started — correlation enrichment
08:56:37 EmilyAI confidence: 95% — escalated to human analyst
08:57:04 Alert assigned to analyst: Sarah Chen
08:58:35 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00047 4h ago DecoyPulse Honeypot Triggered Informational Escalated WS-PC-004
ALR-00440 4h ago DecoyPulse Honeypot Triggered Medium Investigating WS-LAP-011
ALR-00251 7h ago Brute Force SSH Medium Open SRV-APP-01
ALR-00286 8h ago C2 Beacon Activity Low Investigating SRV-APP-01
ALR-00003 10h ago DecoyPulse Honeypot Triggered Informational False Positive WS-PC-004