Interactive Demo — Simulated data only. Back to SOC in a Box
SOC365 Dashboard
Acme Legal Services Ltd Live 13:49:59 UTC

DecoyPulse Honeypot Triggered

Medium Open
ALR-00432 · 2026-04-12T12:57:55Z

Description

DecoyPulse honeypot on AP-WIFI-03 triggered by internal IP. Credentials for decoy admin account used. Zero false positive — investigating.

Alert Metadata

Alert ID
ALR-00432
Timestamp
2026-04-12T12:57:55Z
Severity
Medium
Status
Open
Detection Source
SOC365 Engine
Assigned Analyst
Marcus Webb

Endpoint Information

Hostname
AP-WIFI-03
User Account
c.williams
Source IP
103.175.216.27
Destination IP
10.1.169.20
Origin Country
RU Russia

MITRE ATT&CK Mapping

Tactic
Discovery
Technique
T1018
Reference
attack.mitre.org/techniques/T1018

Investigation Timeline

12:57:55 Event ingested by SOC365 Engine
12:58:00 EmilyAI triage started — correlation enrichment
12:58:00 EmilyAI confidence: 88% — escalated to human analyst
12:58:27 Alert assigned to analyst: Marcus Webb
13:00:02 Investigation started — querying SIEM and threat intelligence

Related Alerts

ID Time Alert Severity Status Host
ALR-00396 1h ago DLP Policy Violation Medium Open AP-WIFI-03
ALR-00234 7h ago Tor Exit Node Connection Medium False Positive AP-WIFI-03
ALR-00400 10h ago Suspicious Scheduled Task Informational False Positive AP-WIFI-03
ALR-00257 16h ago Rogue DHCP Server Informational Resolved AP-WIFI-03
ALR-00282 17h ago Port Scan Detected Low False Positive AP-WIFI-03