DecoyPulse Honeypot Triggered
Critical
Investigating
ALR-00372 · 2026-04-10T19:26:30Z
Description
DecoyPulse honeypot on WS-PC-001 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.
Alert Metadata
Endpoint Information
MITRE ATT&CK Mapping
Investigation Timeline
19:26:30
Event ingested by SOC365 Engine
19:26:33
EmilyAI triage started — correlation enrichment
19:26:39
EmilyAI confidence: 87% — escalated to human analyst
19:26:54
Alert assigned to analyst: Anika Patel
19:27:39
Investigation started — querying SIEM and threat intelligence
Related Alerts
| ID | Time | Alert | Severity | Status | Host |
|---|---|---|---|---|---|
| ALR-00001 | 3h ago | C2 Beacon Activity | Informational | Escalated | WS-PC-001 |
| ALR-00089 | 4h ago | Tor Exit Node Connection | Informational | Resolved | WS-PC-001 |
| ALR-00438 | 10h ago | Suspicious PowerShell Execution | Low | Resolved | WS-PC-001 |
| ALR-00229 | 11h ago | Kerberoasting Attempt | Medium | Resolved | WS-PC-001 |
| ALR-00191 | 13h ago | Malware Signature Match | Low | Resolved | WS-PC-001 |