An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could be coming in from a bot or a malicious actor trying to gain unauthorized access to your infrastructure.
In just 10 minutes, you’ll see how Orca Security can revolutionize your cloud security strategy. Watch a recorded demo from a cloud security expert now.