An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could be coming in from a bot or a malicious actor trying to gain unauthorized access to your infrastructure.
Recommended Mitigation
Ensure that IPs outside the AWS IP range aren't allowed to access your AWS resources or make API calls.