Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:50:01 UTC

DecoyPulse Honeypot Triggered

Critical Investigating
ALR-00372 · 2026-04-10T19:26:30Z

Description

DecoyPulse honeypot on WS-PC-001 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.

Alert Metadata

Alert ID
ALR-00372
Timestamp
2026-04-10T19:26:30Z
Severity
Critical
Status
Investigating
Detection Source
EmilyAI Triage
Assigned Analyst
Anika Patel

Endpoint Information

Hostname
WS-PC-001
User Account
h.roberts
Source IP
194.158.62.129
Destination IP
10.0.196.86
Origin Country
US United States

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1018
Reference
attack.mitre.org/techniques/T1018

Investigation Timeline

19:26:30 Event ingested by SOC365 Engine
19:26:33 EmilyAI triage started — correlation enrichment
19:26:39 EmilyAI confidence: 87% — escalated to human analyst
19:26:54 Alert assigned to analyst: Anika Patel
19:27:39 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00001 3h ago C2 Beacon Activity Informational Escalated WS-PC-001
ALR-00089 4h ago Tor Exit Node Connection Informational Resolved WS-PC-001
ALR-00438 10h ago Suspicious PowerShell Execution Low Resolved WS-PC-001
ALR-00229 11h ago Kerberoasting Attempt Medium Resolved WS-PC-001
ALR-00191 13h ago Malware Signature Match Low Resolved WS-PC-001