Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 15:27:38 UTC

Rogue DHCP Server

Informational Open
ALR-00386 · 2026-04-11T08:01:25Z

Description

Rogue DHCP server detected on VLAN 10 from WS-PC-002. Offering IPs in unexpected range. DecoyPulse quarantined the device.

Alert Metadata

Alert ID
ALR-00386
Timestamp
2026-04-11T08:01:25Z
Severity
Informational
Status
Open
Detection Source
DecoyPulse
Assigned Analyst
EmilyAI (auto)

Endpoint Information

Hostname
WS-PC-002
User Account
a.wilson
Source IP
185.32.220.51
Destination IP
10.2.91.57
Origin Country
KP North Korea

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1557.003
Reference
attack.mitre.org/techniques/T1557.003

Investigation Timeline

08:01:25 Event ingested by SOC365 Engine
08:01:28 EmilyAI triage started — correlation enrichment
08:01:32 EmilyAI confidence: 94% — escalated to human analyst
08:02:01 Alert assigned to analyst: EmilyAI (auto)
08:02:24 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00367 2h ago Tor Exit Node Connection Medium Open WS-PC-002
ALR-00137 6h ago Unauthorised USB Device Informational Open WS-PC-002
ALR-00399 8h ago DecoyPulse Honeypot Triggered Low Escalated WS-PC-002
ALR-00292 11h ago Rogue DHCP Server Medium False Positive SRV-DC-01
ALR-00438 1d ago Rogue DHCP Server Low False Positive SRV-DC-01