Suspicious activity

EC2 Role is used from non-AWS IP address range

Platform(s)
Compliance Frameworks
  • cis_8

Description

An EC2 role was used from an IP that doesn't fall within the whitelisted AWS IP range. The request could be coming in from a bot or a malicious actor trying to gain unauthorized access to your infrastructure.