Skip to content

Latest commit

 

History

History
23 lines (17 loc) · 768 Bytes

6.22.md

File metadata and controls

23 lines (17 loc) · 768 Bytes

6.22 - Any remote IP addresses attemting to exploit Log4j 2 vulnerability?

List top remote IP addresses most frequently attempting to exploit "Log4j 2" vulnerability against any of your internet-facing applications sitting behind HTTP(S) Load Balancer.

Category: Network Activity
Use Cases: Detect
Data Sources: HTTP(S) LB Logs

Queries or Rules

BigQuery Chronicle
SQL Contribute rule

Event Generation

No event generation steps provided. Contribute emulation test to this use case.

Sample Event

No log samples provided. Contribute log samples to this use case.