Suspicious activity

EC2 Role is used from non-AWS IP address range

Compliance Frameworks
  • cis_8


An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could be coming in from a bot or a malicious actor trying to gain unauthorized access to your infrastructure.