Hi Jeremy Robertson1,
Thank you for posting in the Microsoft Community Forums.
After the account is locked, determine on which domain control the account is locked:
a. Please note that the account will only be locked out on one domain controller, and then this lockout action will be replicated to other domain controllers as an emergency.
b. On any domain machine, download and install lockoutstatus.exe: Download Account Lockout Status (LockoutStatus.exe) from Official Microsoft Download Center
c. You can refer to the document: "How to use the LockoutStatus.exe Tool" in http://technet.microsoft.com/en-us/library/cc738772(WS.10). aspx
d. Double click on the tool, click File -> select target, enter the username and domain information, and click OK. (Here the username is the locked AD account.) You can see all the DCs in the domain where users are being sent incorrect passwords to authenticate.
If you find the wrong password verification on both PDC and normal DC, it means the wrong password verification may be done on normal domain control and then sent to PDC for confirmation.
Here is another reference about ID4740 A user account was locked out:
4740(S) A user account was locked out. - Windows 10 | Microsoft Learn
You can check whether you can see event ID 4771 (Kerberos Authentication) or event ID 4776 (NTLM authentication) before the event ID 4740 generated on Domain Controllers? If so, you can check if there is caller computer name via event ID 4771 or event ID 4776.
Best regards
Neuvi Jiang
============================================
If the answer is helpful, click "Accept Answer" and vote for it.