Suspicious activity

EC2 Role is used from non-AWS IP address range

Platform(s)
Compliance Frameworks

Description

An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could be coming in from a bot or a malicious actor trying to gain unauthorized access to your infrastructure.