| C2 communication attempt indicating infection | DNS, IP, HTTP, TLS | |
| Traffic to a malicious spear phishing site | DNS, HTTP | |
| Traffic to a suspicious young domain impersonating a known brand | DNS, HTTP | |
| AWS API calls by a malicious caller | AWS CloudTrail | |
| AWS API calls indicating setup of mass mailer script | AWS CloudTrail | |
| AWS EC2 credential used from an unknown external location | AWS CloudTrail | |
| AWS EC2 credential used from an unknown external location Beta | AWS CloudTrail | |
| AWS WorkMail mailbox exported to a bucket that was made public | AWS CloudTrail | |
| AWS console login from an EC2 instance | AWS CloudTrail | |
| AWS policy modified to allow any principal to assume an IAM role | AWS CloudTrail | |
| AWS root access key created | AWS CloudTrail | |
| Anonymizing circuit setup indicating infection or evasion attempt | IP | |
| Cryptomining indicating infection or resource abuse | DNS, IP, HTTP | |
| Domain resolves to 169.254.169.254 indicating an AWS rebinding attack | DNS, HTTP | |
| Encrypted DNS traffic to a server that supports non-ICANN TLDs | DNS, IP, HTTP | |
| Excessive number of HTTP failures to a known bad destination | HTTP | |
| GitHub SSH key added by suspicious IP address | GitHub | |
| HTTP GET request to a known bad destination indicating infection | HTTP | |
| HTTP POST to a known bad destination indicating infection | HTTP | |
| Known bad dynamic DNS provider traffic | DNS, HTTP | |
| Known bad tunneling provider traffic | DNS, IP, HTTP | |
| Kubernetes API calls by a malicious caller Beta | Kubernetes | |
| Multiple requests to DGA domains indicating infection | DNS, HTTP | |
| Multiple requests to long hostnames indicating DNS tunneling | DNS, HTTP | |
| Multiple suspicious connections indicating TrickBot infection | DNS, IP, HTTP, TLS | |
| Out-of-band application security testing traffic requiring investigation | DNS, IP, HTTP | |
| Outbound TCP port scan indicating hacking tool use or infection | IP | |
| Quarantine applied to possibly compromised AWS credentials | AWS CloudTrail | |
| Suspicious AWS API calls with root account credentials | AWS CloudTrail | |
| Suspicious IRC traffic indicating infection | DNS, IP | |
| Suspicious SSH session masquerading as a different protocol | IP | |
| Suspicious use of an AWS IAM role that was unused for a long period Beta | AWS CloudTrail | |
| Telegram Bot API traffic indicating possible infection | DNS, HTTP | |
| Traffic from multiple sources to a domain impersonating a known brand | DNS, HTTP | |
| Traffic to a known malware distribution site | DNS, IP, HTTP | |
| Traffic to a known sinkhole indicating infection | DNS, IP, HTTP | |
| Traffic to a suspicious domain impersonating a known brand | DNS, HTTP | |
| Traffic to a web server with a suspicious open directory on an unusual port | DNS, IP, HTTP | |
| Traffic to a young suspicious domain containing a brand name | DNS, HTTP | |
| Traffic to malicious infrastructure capturing credentials | DNS, IP, HTTP | |
| 1Password actions by a likely malicious caller Beta | 1Password | |
| AWS API calls indicating EKS privilege escalation in multiple clusters Beta | AWS CloudTrail | |
| AWS API calls indicating S3 buckets discovery in a suspicious way Beta | AWS CloudTrail | |
| AWS API calls with root account access key | AWS CloudTrail | |
| AWS Backup vault modified to allow public access Beta | AWS CloudTrail | |
| AWS DataSync task initiated to an unknown external account | AWS CloudTrail | |
| AWS Detective graph deleted Beta | AWS CloudTrail | |
| AWS EBS snapshot modified to allow public access | AWS CloudTrail | |
| AWS EC2 Windows Adminstrator encrypted password enumeration | AWS CloudTrail | |
| AWS EC2 export task to an unknown S3 bucked initiated | AWS CloudTrail | |
| AWS EC2 instance unexpectedly interacted with the IAM API | AWS CloudTrail | |
| AWS EC2 instances unexpectedly described in multiple regions | AWS CloudTrail | |
| AWS ECR public repository modified to allow global write access | AWS CloudTrail | |
| AWS EKS access entry unexpectedly created allowing admin access Beta | AWS CloudTrail | |
| AWS Elastic IP address transfer to an unknown external account | AWS CloudTrail | |
| AWS GuardDuty disabled | AWS CloudTrail | |
| AWS GuardDuty publishing destination deleted Beta | AWS CloudTrail | |
| AWS IAM policy modified to allow access to any resource via suspicious statement | AWS CloudTrail | |
| AWS IAM trust policy misconfigured for OIDC Beta | AWS CloudTrail | |
| AWS IAM user created with admin policy attached Beta | AWS CloudTrail | |
| AWS KMS key modified to allow public access | AWS CloudTrail | |
| AWS Lambda layer modified to allow public access Beta | AWS CloudTrail | |
| AWS RDS export task to an unknown S3 bucket initiated | AWS CloudTrail | |
| AWS RDS snapshot modified to allow public access | AWS CloudTrail | |
| AWS RDS snapshot unexpectedly created and made public | AWS CloudTrail | |
| AWS Redshift cluster modified to allow public access Beta | AWS CloudTrail | |
| AWS Route 53 domain transfer to an unknown external account | AWS CloudTrail | |
| AWS S3 bucket accidentally modified to allow public access | AWS CloudTrail | |
| AWS S3 bucket configured with short retention period in a suspicious way Beta | AWS CloudTrail | |
| AWS S3 bucket modified to allow public access via suspicious statement | AWS CloudTrail | |
| AWS S3 bucket replication to an unknown external account | AWS CloudTrail | |
| AWS S3 object accessed without TLS | AWS CloudTrail | |
| AWS S3 object accessed without authentication | AWS CloudTrail | |
| AWS S3 object encrypted using an external KMS key | AWS CloudTrail | |
| AWS SES identities discovery via access key | AWS CloudTrail | |
| AWS SNS Topic modified to allow public access | AWS CloudTrail | |
| AWS SQS Queue modified to allow public access | AWS CloudTrail | |
| AWS SSM document modified to allow public access Beta | AWS CloudTrail | |
| AWS STS discovery with Truffle Hog | AWS CloudTrail | |
| AWS Security Hub disabled Beta | AWS CloudTrail | |
| AWS VPC peering connection to an unknown external account established | AWS CloudTrail | |
| AWS access key created by the root account | AWS CloudTrail | |
| AWS access key used to delete itself unexpectedly | AWS CloudTrail | |
| AWS account password policy changed in a suspicious way | AWS CloudTrail | |
| AWS decoy resource accessed | AWS CloudTrail | |
| AWS policy allows passing any role | AWS CloudTrail | |
| AWS policy allows to perform any action via suspicious statement | AWS CloudTrail | |
| AWS policy modified to allow unknown principal to assume an IAM role Beta | AWS CloudTrail | |
| AWS policy suggests denial but allows actions | AWS CloudTrail | |
| AWS policy suggests narrow access but allows broad access | AWS CloudTrail | |
| AWS policy suggests read-only access but allows write actions | AWS CloudTrail | |
| AWS role assumed by an unknown external principal | AWS CloudTrail | |
| AWS root account unexpectedly assumed via temporary credentials | AWS CloudTrail | |
| AWS root password recovery request from an unknown ASN | AWS CloudTrail | |
| AWS service quota unexpectedly described in multiple regions | AWS CloudTrail | |
| Anonymous access unexpectedly granted to a Kubernetes cluster Beta | Kubernetes | |
| Atlassian actions by a likely malicious caller Beta | Atlassian | |
| Beaconing to a rare domain | DNS, HTTP | |
| Beaconing to a suspicious domain | DNS, HTTP | |
| Cluster of suspicious requests requiring investigation | DNS, IP, HTTP | |
| Excessive disruption of Slack user sessions via invalidation | Slack | |
| Excessive number of HTTP failures to a suspicious destination | HTTP | |
| GitHub API calls by a malicious caller | GitHub | |
| GitHub audit log stream destroyed or paused | GitHub | |
| GitHub personal access token used to download high number of repositories | GitHub | |
| High volume of outbound ICMP traffic indicating tunneling | IP | |
| High volume of outbound traffic over FTP | IP | |
| High volume of outbound traffic over SMB | IP | |
| High volume of outbound traffic over SSH | IP | |
| High volume of reverse DNS lookups indicating scanning activity | DNS | |
| IRC traffic requiring investigation | DNS, IP | |
| Jira actions by a likely malicious caller Beta | Jira | |
| Kubernetes resource created in public namespace Beta | Kubernetes | |
| Kubernetes service account created in public namespace Beta | Kubernetes | |
| Linux SSHD login by a likely malicious caller Beta | Linux | |
| MFA delete disabled on AWS S3 bucket Beta | AWS CloudTrail | |
| Multiple AWS EC2 instances launched unexpectedly | AWS CloudTrail | |
| Multiple AWS IAM users deleted within a short period Beta | AWS CloudTrail | |
| Multiple connections to suspicious IP destinations | IP | |
| Multiple denied AWS assume role API calls requiring investigation | AWS CloudTrail | |
| Multiple encrypted DNS requests requiring investigation | DNS, IP, HTTP | |
| Multiple requests to a rare domain | DNS, HTTP | |
| Multiple requests to suspicious domains | DNS, HTTP | |
| Multiple unexpected AWS API calls executed in dry run mode | AWS CloudTrail | |
| Okta FastPass blocked a phishing attempt | Okta | |
| Okta MFA bypass attempt detected | Okta | |
| Outbound SSH session using an uncommon server port | IP | |
| Outbound traffic indicating Denial of Service attack | IP | |
| P2P activity | DNS, IP, HTTP | |
| Possible 1Password login brute force Beta | 1Password | |
| Potential ransomware note uploaded to an AWS S3 bucket | AWS CloudTrail | |
| Potentially unwanted program or browser extension installed | DNS, IP, HTTP | |
| Previously unseen AWS Bedrock model invoked Beta | AWS CloudTrail | |
| Secret found in a GitHub repository | GitHub | |
| Several unsuccessful AWS console login attempts from the same IP address for different users | AWS CloudTrail | |
| Several unsuccessful Slack login attempts indicating brute force activity | Slack | |
| Slack API calls by a malicious caller | Slack | |
| Slack EKM Unenrolled | Slack | |
| Slack application access expanded with admin scopes | Slack | |
| Slack application with admin scopes added | Slack | |
| Slack login with unexpected user email | Slack | |
| Slack organization deleted | Slack | |
| Slack service owner transferred | Slack | |
| Slack team member logged out due to a compromised device | Slack | |
| Successful AWS console login without MFA | AWS CloudTrail | |
| Successful Okta MFA login after multiple MFA pushes | Okta | |
| Suspicious 1Password login Beta | 1Password | |
| Suspicious AWS API call with account access key | AWS CloudTrail | |
| Suspicious AWS API calls indicating API Gateway keys access Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating Backup plan deletion Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating Bedrock model invocation | AWS CloudTrail | |
| Suspicious AWS API calls indicating Cost Explorer discovery | AWS CloudTrail | |
| Suspicious AWS API calls indicating DynamoDB backup restoration | AWS CloudTrail | |
| Suspicious AWS API calls indicating EC2 subnet deletion Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating ECR repository with automatic scanning disabled Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating ECS cluster creation | AWS CloudTrail | |
| Suspicious AWS API calls indicating Firehose delivery stream destination change Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating IAM role trust policy modification failure Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating IP set modification | AWS CloudTrail | |
| Suspicious AWS API calls indicating Organizations discovery | AWS CloudTrail | |
| Suspicious AWS API calls indicating RDS data destruction | AWS CloudTrail | |
| Suspicious AWS API calls indicating RDS instance with disabled encryption Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating Route 53 log tampering | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 ACL modifications | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 bucket encryption reset to default Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 data staging and exfiltration | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 delete operations | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 reconnaissance | AWS CloudTrail | |
| Suspicious AWS API calls indicating S3 write operations | AWS CloudTrail | |
| Suspicious AWS API calls indicating SAML activity | AWS CloudTrail | |
| Suspicious AWS API calls indicating SES discovery | AWS CloudTrail | |
| Suspicious AWS API calls indicating STS discovery | AWS CloudTrail | |
| Suspicious AWS API calls indicating SageMaker presigned URL generation Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating Secrets Manager discovery Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating WAF control list modification Beta | AWS CloudTrail | |
| Suspicious AWS API calls indicating WAF disassociation | AWS CloudTrail | |
| Suspicious AWS API calls indicating change of IAM user password | AWS CloudTrail | |
| Suspicious AWS API calls indicating command execution via System Manager | AWS CloudTrail | |
| Suspicious AWS API calls indicating creation of API Gateway key | AWS CloudTrail | |
| Suspicious AWS API calls indicating creation of REST API | AWS CloudTrail | |
| Suspicious AWS API calls indicating data staging and exfiltration | AWS CloudTrail | |
| Suspicious AWS API calls indicating deletion of Elastic File System | AWS CloudTrail | |
| Suspicious AWS API calls indicating deletion of access key | AWS CloudTrail | |
| Suspicious AWS API calls indicating discovery using Tagging API | AWS CloudTrail | |
| Suspicious AWS API calls indicating disruption | AWS CloudTrail | |
| Suspicious AWS API calls indicating evasion | AWS CloudTrail | |
| Suspicious AWS API calls indicating infrastructure modification using CloudFormation | AWS CloudTrail | |
| Suspicious AWS API calls indicating modification of Resource Access Manager | AWS CloudTrail | |
| Suspicious AWS API calls indicating modification of config monitoring | AWS CloudTrail | |
| Suspicious AWS API calls indicating new image being pushed to ECR with latest tag | AWS CloudTrail | |
| Suspicious AWS API calls indicating persistence | AWS CloudTrail | |
| Suspicious AWS API calls indicating privilege escalation | AWS CloudTrail | |
| Suspicious AWS API calls indicating reconnaissance | AWS CloudTrail | |
| Suspicious AWS API calls indicating resource enumeration | AWS CloudTrail | |
| Suspicious AWS API calls indicating retrieval of sign-in token | AWS CloudTrail | |
| Suspicious AWS API calls indicating unauthorized access | AWS CloudTrail | |
| Suspicious AWS Bedrock API usage via programmatic access Beta | AWS CloudTrail | |
| Suspicious AWS IAM user created with generic name | AWS CloudTrail | |
| Suspicious AWS S3 bucket encryption configuration Beta | AWS CloudTrail | |
| Suspicious AWS access key created | AWS CloudTrail | |
| Suspicious AWS console login | AWS CloudTrail | |
| Suspicious HTTP GET request requiring investigation | HTTP | |
| Suspicious Kubernetes API calls indicating access to secret Beta | Kubernetes | |
| Suspicious Kubernetes API calls indicating namespace creation Beta | Kubernetes | |
| Suspicious Kubernetes API calls indicating permission discovery Beta | Kubernetes | |
| Suspicious Okta API calls indicating MFA modification | Okta | |
| Suspicious Okta API calls indicating application modification | Okta | |
| Suspicious Okta API calls indicating application sign on policy modification | Okta | |
| Suspicious Okta API calls indicating identity provider creation | Okta | |
| Suspicious Okta API calls indicating user creation | Okta | |
| Suspicious Okta API calls indicating user profile modification | Okta | |
| Suspicious Okta user session created | Okta | |
| Suspicious Tor DNS request | DNS | |
| Suspicious dynamic DNS provider traffic | DNS, HTTP | |
| Suspicious file accessed or uploaded to Slack | Slack | |
| Suspicious hosting provider traffic | DNS, HTTP | |
| Suspicious traffic to DNS server that supports non-ICANN TLDs | IP | |
| Suspicious traffic to a link-in-bio destination | DNS, HTTP | |
| Suspicious traffic to user survey site indicating possible phishing | DNS, HTTP | |
| Suspicious tunneling provider traffic | DNS, IP, HTTP | |
| Third-party VPN traffic | DNS, IP, HTTP | |
| Third-party remote access software installed | DNS, IP, HTTP | |
| Traffic from multiple sources to a unique young domain | DNS, HTTP | |
| Traffic over a cleartext protocol exposing content and credentials | IP | |
| Traffic to a TDS mechanism requiring investigation | DNS, HTTP | |
| Traffic to a destination serving malicious JavaScript | DNS, HTTP | |
| Traffic to a free webhook service indicating potential exfiltration | DNS, HTTP | |
| Traffic to a likely malicious domain | DNS, HTTP | |
| Traffic to a suspicious domain containing a brand name | DNS, HTTP | |
| Traffic to a web server with a suspicious open directory | DNS, IP, HTTP | |
| Traffic to a young domain impersonating a known brand | DNS, HTTP | |
| Traffic to an unknown blocklisted destination | DNS, IP, HTTP | |
| Traffic to an unusual and suspicious port requiring investigation | IP | |
| Unexpected AWS API calls with root account credentials | AWS CloudTrail | |
| Unexpected AWS EC2 Windows Adminstrator encrypted password enumeration | AWS CloudTrail | |
| Unexpected AWS role assumed by an external principal | AWS CloudTrail | |
| Unexpected anonymous API call to a Kubernetes cluster Beta | Kubernetes | |
| Unsuccessful and unexpected attempt to assume AWS root account | AWS CloudTrail | |
| Unusual excessive AWS S3 bucket deletion requests Beta | AWS CloudTrail | |
| Unusual mail traffic indicating possible implant | IP | |
| Use of an AWS IAM access key that was unused for a long period Beta | AWS CloudTrail | |
| Use of an AWS IAM role that was unused for a long period Beta | AWS CloudTrail | |
| Use of an AWS IAM user that was unused for a long period Beta | AWS CloudTrail | |
| User activity from previously unseen ASN | AWS CloudTrail | |
| User activity from previously unseen country | AWS CloudTrail | |
| 1Password login from unexpected device Beta | 1Password | |
| 1Password service account token activity Beta | 1Password | |
| 1Password values exported Beta | 1Password | |
| A large AWS EC2 instance launch with an unusual instance type | AWS CloudTrail | |
| AWS ACM certificate authority deleted Beta | AWS CloudTrail | |
| AWS AMI modified to allow public access | AWS CloudTrail | |
| AWS API calls indicating CloudFormation privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating DataPipeline privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating DynamoDB privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating EC2 privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating Glue privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating IAM privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating KMS privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating Lambda privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating S3 buckets discovery Beta | AWS CloudTrail | |
| AWS API calls indicating SSM privilege escalation Beta | AWS CloudTrail | |
| AWS API calls indicating evasion attempts on Amazon Macie | AWS CloudTrail | |
| AWS API calls indicating tampering with Security Hub findings | AWS CloudTrail | |
| AWS Application Load Balancer configured with insecure SSL protocol policy Beta | AWS CloudTrail | |
| AWS CloudFront distribution configured with insecure SSL protocol policy Beta | AWS CloudTrail | |
| AWS CloudTrail event selector does not cover all management events Beta | AWS CloudTrail | |
| AWS CloudWatch alarm deleted | AWS CloudTrail | |
| AWS CodeBuild project modified to allow public access | AWS CloudTrail | |
| AWS DataSync task initiated unexpectedly | AWS CloudTrail | |
| AWS EBS default encryption disabled | AWS CloudTrail | |
| AWS EC2 export task initiated unexpectedly | AWS CloudTrail | |
| AWS EC2 instance interacted with the IAM API | AWS CloudTrail | |
| AWS EC2 instance launch in a new region | AWS CloudTrail | |
| AWS EC2 instance launches in multiple regions | AWS CloudTrail | |
| AWS EC2 instance performed multiple unique API actions Beta | AWS CloudTrail | |
| AWS EC2 instances described in multiple regions | AWS CloudTrail | |
| AWS ECR automatic registry scanning disabled Beta | AWS CloudTrail | |
| AWS ECR image uploaded | AWS CloudTrail | |
| AWS ECS cluster unexpectedly deleted Beta | AWS CloudTrail | |
| AWS EKS access entry created allowing admin access Beta | AWS CloudTrail | |
| AWS EKS cluster endpoint modified to allow public access Beta | AWS CloudTrail | |
| AWS ElastiCache Redis cluster created without encryption at rest | AWS CloudTrail | |
| AWS ElastiCache security group modified unexpectedly | AWS CloudTrail | |
| AWS GuardDuty threat list disabled | AWS CloudTrail | |
| AWS IAM Access Analyzer deleted Beta | AWS CloudTrail | |
| AWS IAM entity created unexpectedly | AWS CloudTrail | |
| AWS IAM login profile created unexpectedly | AWS CloudTrail | |
| AWS IAM login profile unexpectedly modified by a different identity than the owner | AWS CloudTrail | |
| AWS IAM policy granting full or admin access attached | AWS CloudTrail | |
| AWS IAM policy modified to allow access to any resource | AWS CloudTrail | |
| AWS IAM user created with generic name unexpectedly | AWS CloudTrail | |
| AWS IAM user groups discovery | AWS CloudTrail | |
| AWS IAM user profile created without password reset | AWS CloudTrail | |
| AWS KMS customer managed key disabled or scheduled for deletion | AWS CloudTrail | |
| AWS Lambda function modified to allow public invocation | AWS CloudTrail | |
| AWS Lambda functions modified | AWS CloudTrail | |
| AWS Lightsail instance launched unexpectedly | AWS CloudTrail | |
| AWS MFA device disabled unexpectedly | AWS CloudTrail | |
| AWS MFA device registered unexpectedly | AWS CloudTrail | |
| AWS OpenSearch domain configured to allow public access Beta | AWS CloudTrail | |
| AWS Organization invite sent for another account to join the organization Beta | AWS CloudTrail | |
| AWS RDS Deletion Protection disabled unexpectedly | AWS CloudTrail | |
| AWS RDS export task initiated unexpectedly | AWS CloudTrail | |
| AWS RDS instance modified to allow public access | AWS CloudTrail | |
| AWS RDS instance password changed unexpectedly | AWS CloudTrail | |
| AWS RDS security group created unexpectedly | AWS CloudTrail | |
| AWS RDS snapshot created and made public | AWS CloudTrail | |
| AWS RDS snapshot created manually | AWS CloudTrail | |
| AWS Redshift cluster encryption disabled Beta | AWS CloudTrail | |
| AWS Roles Anywhere profile created | AWS CloudTrail | |
| AWS Route 53 hosted zone associated with a VPC | AWS CloudTrail | |
| AWS Route 53 public hosted zone created unexpectedly | AWS CloudTrail | |
| AWS S3 Access Point modified to allow public access Beta | AWS CloudTrail | |
| AWS S3 bucket lifecycle disabled Beta | AWS CloudTrail | |
| AWS S3 bucket modified to allow public access | AWS CloudTrail | |
| AWS S3 bucket policy allows actions by external accounts Beta | AWS CloudTrail | |
| AWS S3 bucket versioning suspended unexpectedly | AWS CloudTrail | |
| AWS SES GetAccount action invoked via AccessKey | AWS CloudTrail | |
| AWS SES identity deleted | AWS CloudTrail | |
| AWS SES production access granted | AWS CloudTrail | |
| AWS STS GetFederationToken invoked by aws_consoler utility Beta | AWS CloudTrail | |
| AWS STS federation token issued with access to all resources Beta | AWS CloudTrail | |
| AWS STS federation token issued with permissions allowing all actions Beta | AWS CloudTrail | |
| AWS SageMaker domain modified to allow public access Beta | AWS CloudTrail | |
| AWS Secrets Manager access from CloudShell session Beta | AWS CloudTrail | |
| AWS System Manager encrypted parameter retrieved unexpectedly | AWS CloudTrail | |
| AWS WorkMail mailbox exported | AWS CloudTrail | |
| AWS access key created for a newly registered IAM user | AWS CloudTrail | |
| AWS access key created unexpectedly | AWS CloudTrail | |
| AWS access key used to delete itself | AWS CloudTrail | |
| AWS account created unexpectedly | AWS CloudTrail | |
| AWS account password policy changed in an unexpected way | AWS CloudTrail | |
| AWS account password policy deleted | AWS CloudTrail | |
| AWS identity added to an admin group | AWS CloudTrail | |
| AWS network infrastructure modification opening a wide range of ports | AWS CloudTrail | |
| AWS policy contains unsubstituted template values | AWS CloudTrail | |
| AWS policy that allows to perform any action was added | AWS CloudTrail | |
| AWS region enabled or disabled Beta | AWS CloudTrail | |
| AWS resource drift from IaC configuration Beta | AWS CloudTrail | |
| AWS root account assumed via temporary credentials | AWS CloudTrail | |
| AWS service quota described in multiple regions | AWS CloudTrail | |
| AWS service quota increase request created Beta | AWS CloudTrail | |
| An AWS account removed itself from the organization | AWS CloudTrail | |
| Anonymous access granted to a Kubernetes cluster Beta | Kubernetes | |
| Atlassian admin API token created Beta | Atlassian | |
| Atlassian administrator impersonated another user Beta | Atlassian | |
| Atlassian organization admin added Beta | Atlassian | |
| Atlassian user added to administrative group Beta | Atlassian | |
| Confluence global setting modified Beta | Confluence | |
| Confluence public link for a page turned on Beta | Confluence | |
| Confluence site exported Beta | Confluence | |
| Confluence space exported Beta | Confluence | |
| Connection to an AWS EC2 instance using EC2 Instance Connect by a suspicious user | AWS CloudTrail | |
| Connection to multiple AWS EC2 instances using EC2 Instance Connect | AWS CloudTrail | |
| DNS misconfiguration leading to potential compromise | DNS | |
| Encrypted DNS traffic indicating potential infection or evasion | DNS, IP, HTTP | |
| Excessive number of DNS failures requiring investigation | DNS | |
| Excessive number of HTTP failures to an uncommon destination | HTTP | |
| GitHub Advanced Security setting modified | GitHub | |
| GitHub bot unexpected activities | GitHub | |
| GitHub branch protections were disabled for the repository | GitHub | |
| GitHub mass pushes | GitHub | |
| GitHub organization transferred to another Enterprise account | GitHub | |
| GitHub public repository created | GitHub | |
| GitHub repository transferred to another Enterprise account | GitHub | |
| GitHub repository visibility changed to public | GitHub | |
| GitHub secret scanning disabled or bypassed | GitHub | |
| High number of non-public GitHub repositories downloaded | GitHub | |
| IAM default policy set to an unexpected version | AWS CloudTrail | |
| IAM role attached to an AWS RDS instance unexpectedly | AWS CloudTrail | |
| Jira user added to administrative group Beta | Jira | |
| Kubernetes admission controller created Beta | AWS CloudTrail | |
| Kubernetes pod command executed Beta | Kubernetes | |
| Kubernetes privileged pod created Beta | Kubernetes | |
| Kubernetes resource created in service namespace Beta | Kubernetes | |
| Kubernetes service account created in service namespace Beta | Kubernetes | |
| MFA disabled for GitHub organization or Enterprise account | GitHub | |
| Malicious pop-up traffic | DNS, HTTP | |
| Many AWS Route 53 domains registered | AWS CloudTrail | |
| Modification of multiple AWS EC2 instance startup scripts | AWS CloudTrail | |
| Multiple AWS API calls executed in dry run mode | AWS CloudTrail | |
| Multiple AWS EC2 instances launched | AWS CloudTrail | |
| Multiple AWS EC2 instances terminated unexpectedly | AWS CloudTrail | |
| Multiple AWS root password recovery requests | AWS CloudTrail | |
| Multiple Okta users failed to login from a single IP address | Okta | |
| Multiple denied AWS API calls requiring investigation | AWS CloudTrail | |
| Multiple denied AWS S3 API calls requiring investigation | AWS CloudTrail | |
| Multiple denied Kubernetes API calls requiring investigation Beta | Kubernetes | |
| Multiple rejected Okta MFA Push notifications for a single user | Okta | |
| Multiple requests to unreachable domains | DNS, HTTP | |
| Okta MFA IP mismatch between challenge and verification Beta | Okta | |
| Okta admin role assigned | Okta | |
| Okta suspicious session cookie usage Beta | Okta | |
| Outbound RDP traffic indicating brute force activity | IP | |
| Outbound SSH traffic indicating brute force activity | IP | |
| Outbound WinRM traffic indicating brute force activity | IP | |
| Registered domain impersonating a known brand | DNS | |
| Several unsuccessful AWS console login attempts for a user | AWS CloudTrail | |
| Several unsuccessful AWS console login attempts from the same IP address | AWS CloudTrail | |
| Several unsuccessful Okta login attempts for a user Beta | Okta | |
| Slack API calls from an unexpected IP address | Slack | |
| Slack API calls from an unexpected client | Slack | |
| Slack API calls from an unexpected user agent | Slack | |
| Slack EKM logging config modified | Slack | |
| Slack Microsoft Intune MDM disabled | Slack | |
| Slack SSO restriction changed | Slack | |
| Slack app removed | Slack | |
| Slack application access expanded | Slack | |
| Slack application added | Slack | |
| Slack data prevention rule modified | Slack | |
| Slack identity provider config modified | Slack | |
| Slack information barrier modified | Slack | |
| Slack legal hold policy modified | Slack | |
| Slack manual export downloaded | Slack | |
| Slack public link created to file with potentially sensitive data | Slack | |
| Slack user privilege escalation | Slack | |
| Successful AWS console login from a new country | AWS CloudTrail | |
| Successful Okta user session created from a new country | Okta | |
| Successful anonymous API call to a Kubernetes cluster Beta | Kubernetes | |
| Suspicious GitHub activity performed via OAuth access token | GitHub | |
| Suspicious HTTP POST request requiring investigation | HTTP | |
| Traffic to a suspicious IP destination | IP | |
| Traffic to a suspicious domain | DNS, HTTP | |
| Traffic to a valid domain impersonating a known brand | DNS, HTTP | |
| Traffic to a web server with an open directory on an unusual port | DNS, IP, HTTP | |
| Traffic to an IP lookup service | DNS, IP, HTTP | |
| Traffic to an unusual DNS resolver | IP | |
| Traffic to an unusual port requiring investigation | IP | |
| Unexpected 1Password item usage action observed Beta | 1Password | |
| Unexpected AWS API call with account access key | AWS CloudTrail | |
| Unexpected AWS API calls by a likely malicious caller | AWS CloudTrail | |
| Unexpected AWS API calls indicating API Gateway keys access Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating Backup plan deletion Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating Bedrock model invocation | AWS CloudTrail | |
| Unexpected AWS API calls indicating Cost Explorer discovery | AWS CloudTrail | |
| Unexpected AWS API calls indicating DynamoDB backup restoration | AWS CloudTrail | |
| Unexpected AWS API calls indicating EC2 subnet deletion Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating ECR repository with automatic scanning disabled Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating ECS cluster creation | AWS CloudTrail | |
| Unexpected AWS API calls indicating Firehose delivery stream destination change Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating IAM role trust policy modification failure Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating IP set modification | AWS CloudTrail | |
| Unexpected AWS API calls indicating Organizations discovery | AWS CloudTrail | |
| Unexpected AWS API calls indicating RDS data destruction | AWS CloudTrail | |
| Unexpected AWS API calls indicating RDS instance with disabled encryption Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating Route 53 log tampering | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 ACL modifications | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 bucket encryption reset to default Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 data staging and exfiltration | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 delete operations | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 reconnaissance | AWS CloudTrail | |
| Unexpected AWS API calls indicating S3 write operations | AWS CloudTrail | |
| Unexpected AWS API calls indicating SAML activity | AWS CloudTrail | |
| Unexpected AWS API calls indicating SES discovery | AWS CloudTrail | |
| Unexpected AWS API calls indicating STS discovery | AWS CloudTrail | |
| Unexpected AWS API calls indicating SageMaker presigned URL generation Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating Secrets Manager discovery Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating WAF control list modification Beta | AWS CloudTrail | |
| Unexpected AWS API calls indicating WAF disassociation | AWS CloudTrail | |
| Unexpected AWS API calls indicating change of IAM user password | AWS CloudTrail | |
| Unexpected AWS API calls indicating command execution via System Manager | AWS CloudTrail | |
| Unexpected AWS API calls indicating creation of API Gateway key | AWS CloudTrail | |
| Unexpected AWS API calls indicating creation of REST API | AWS CloudTrail | |
| Unexpected AWS API calls indicating data staging and exfiltration | AWS CloudTrail | |
| Unexpected AWS API calls indicating deletion of Elastic File System | AWS CloudTrail | |
| Unexpected AWS API calls indicating deletion of access key | AWS CloudTrail | |
| Unexpected AWS API calls indicating discovery using Tagging API | AWS CloudTrail | |
| Unexpected AWS API calls indicating disruption | AWS CloudTrail | |
| Unexpected AWS API calls indicating evasion | AWS CloudTrail | |
| Unexpected AWS API calls indicating infrastructure modification using CloudFormation | AWS CloudTrail | |
| Unexpected AWS API calls indicating modification of Resource Access Manager | AWS CloudTrail | |
| Unexpected AWS API calls indicating modification of config monitoring | AWS CloudTrail | |
| Unexpected AWS API calls indicating new image being pushed to ECR with latest tag | AWS CloudTrail | |
| Unexpected AWS API calls indicating persistence | AWS CloudTrail | |
| Unexpected AWS API calls indicating privilege escalation | AWS CloudTrail | |
| Unexpected AWS API calls indicating reconnaissance | AWS CloudTrail | |
| Unexpected AWS API calls indicating resource enumeration | AWS CloudTrail | |
| Unexpected AWS API calls indicating retrieval of sign-in token | AWS CloudTrail | |
| Unexpected AWS API calls indicating unauthorized access | AWS CloudTrail | |
| Unexpected AWS EC2 Windows Adminstrator encrypted password fetch attempt | AWS CloudTrail | |
| Unexpected AWS EC2 instance launch | AWS CloudTrail | |
| Unexpected AWS IAM group deletion | AWS CloudTrail | |
| Unexpected AWS S3 bucket configured with short retention period Beta | AWS CloudTrail | |
| Unexpected AWS console login | AWS CloudTrail | |
| Unexpected AWS role assumed by a principal | AWS CloudTrail | |
| Unexpected Kubernetes API calls by a likely malicious caller Beta | Kubernetes | |
| Unexpected Kubernetes API calls indicating access to secret Beta | Kubernetes | |
| Unexpected Kubernetes API calls indicating namespace creation Beta | Kubernetes | |
| Unexpected Kubernetes API calls indicating permission discovery Beta | Kubernetes | |
| Unexpected Okta API calls indicating MFA modification | Okta | |
| Unexpected Okta API calls indicating application modification | Okta | |
| Unexpected Okta API calls indicating application sign on policy modification | Okta | |
| Unexpected Okta API calls indicating identity provider creation | Okta | |
| Unexpected Okta API calls indicating user creation | Okta | |
| Unexpected Okta API calls indicating user profile modification | Okta | |
| Unexpected Okta user session created | Okta | |
| Unexpected Slack API actions from admin account | Slack | |
| Unexpected Slack API calls indicating credential testing activity | Slack | |
| Unexpected Slack API calls indicating excessive downloads | Slack | |
| Unexpected Slack API calls indicating excessive file sharing | Slack | |
| Unexpected Slack API calls indicating malware share | Slack | |
| Unexpected Slack API calls indicating message deletion activity | Slack | |
| Unexpected Slack API calls indicating scraping activity | Slack | |
| Unexpected Slack session with inconsistent client fingerprint | Slack | |
| Unexpected high volume of Slack API calls | Slack | |
| Unknown GitHub user cloned private repository | GitHub | |
| Unknown dynamic DNS provider traffic | DNS, HTTP | |
| Unknown tunneling provider traffic | DNS, IP, HTTP | |
| Unsuccessful AWS IAM password change attempt | AWS CloudTrail | |
| Unsuccessful attempt to assume AWS root account | AWS CloudTrail | |
| Unusual AWS API calls with root account credentials | AWS CloudTrail | |
| Unusual excessive traffic requiring investigation | IP | |
| User activity from unexpected ASN | AWS CloudTrail | |
| User activity from unexpected country | AWS CloudTrail | |
| User invited to Atlassian organization as an administrator Beta | Atlassian | |
| 1Password logins from different locations in a short period Beta | 1Password | |
| 1Password value modification Beta | 1Password | |
| AWS AMI Block Public Access disabled for an account | AWS CloudTrail | |
| AWS API calls indicating API Gateway keys access Beta | AWS CloudTrail | |
| AWS API calls indicating Backup plan deletion Beta | AWS CloudTrail | |
| AWS API calls indicating Bedrock model invocation | AWS CloudTrail | |
| AWS API calls indicating Cost Explorer discovery | AWS CloudTrail | |
| AWS API calls indicating EC2 subnet deletion Beta | AWS CloudTrail | |
| AWS API calls indicating ECR repository with automatic scanning disabled Beta | AWS CloudTrail | |
| AWS API calls indicating ECS cluster creation | AWS CloudTrail | |
| AWS API calls indicating Firehose delivery stream destination change Beta | AWS CloudTrail | |
| AWS API calls indicating IAM role trust policy modification failure Beta | AWS CloudTrail | |
| AWS API calls indicating IP set modification | AWS CloudTrail | |
| AWS API calls indicating Organizations discovery | AWS CloudTrail | |
| AWS API calls indicating RDS data destruction | AWS CloudTrail | |
| AWS API calls indicating RDS instance with disabled encryption Beta | AWS CloudTrail | |
| AWS API calls indicating Route 53 log tampering | AWS CloudTrail | |
| AWS API calls indicating S3 ACL modifications | AWS CloudTrail | |
| AWS API calls indicating S3 bucket encryption reset to default Beta | AWS CloudTrail | |
| AWS API calls indicating S3 data staging and exfiltration | AWS CloudTrail | |
| AWS API calls indicating S3 delete operations | AWS CloudTrail | |
| AWS API calls indicating S3 reconnaissance | AWS CloudTrail | |
| AWS API calls indicating S3 write operations | AWS CloudTrail | |
| AWS API calls indicating SAML activity | AWS CloudTrail | |
| AWS API calls indicating SES discovery | AWS CloudTrail | |
| AWS API calls indicating STS discovery | AWS CloudTrail | |
| AWS API calls indicating SageMaker presigned URL generation Beta | AWS CloudTrail | |
| AWS API calls indicating Secrets Manager discovery Beta | AWS CloudTrail | |
| AWS API calls indicating WAF control list modification Beta | AWS CloudTrail | |
| AWS API calls indicating WAF disassociation | AWS CloudTrail | |
| AWS API calls indicating change of IAM user password | AWS CloudTrail | |
| AWS API calls indicating command execution via System Manager | AWS CloudTrail | |
| AWS API calls indicating creation of API Gateway key | AWS CloudTrail | |
| AWS API calls indicating creation of REST API | AWS CloudTrail | |
| AWS API calls indicating data staging and exfiltration | AWS CloudTrail | |
| AWS API calls indicating deletion of Elastic File System | AWS CloudTrail | |
| AWS API calls indicating deletion of access key | AWS CloudTrail | |
| AWS API calls indicating discovery using Tagging API | AWS CloudTrail | |
| AWS API calls indicating disruption | AWS CloudTrail | |
| AWS API calls indicating evasion | AWS CloudTrail | |
| AWS API calls indicating infrastructure modification using CloudFormation | AWS CloudTrail | |
| AWS API calls indicating modification of Resource Access Manager | AWS CloudTrail | |
| AWS API calls indicating modification of config monitoring | AWS CloudTrail | |
| AWS API calls indicating new image being pushed to ECR with latest tag | AWS CloudTrail | |
| AWS API calls indicating persistence | AWS CloudTrail | |
| AWS API calls indicating privilege escalation | AWS CloudTrail | |
| AWS API calls indicating reconnaissance | AWS CloudTrail | |
| AWS API calls indicating resource enumeration | AWS CloudTrail | |
| AWS API calls indicating retrieval of sign-in token | AWS CloudTrail | |
| AWS API calls indicating unauthorized access | AWS CloudTrail | |
| AWS API calls with root account credentials | AWS CloudTrail | |
| AWS DataSync task initiated | AWS CloudTrail | |
| AWS DynamoDB table restored from backup | AWS CloudTrail | |
| AWS EBS snapshot Block Public Access disabled for an account | AWS CloudTrail | |
| AWS EC2 NAT gateway deleted Beta | AWS CloudTrail | |
| AWS EC2 Windows Adminstrator encrypted password fetch attempt | AWS CloudTrail | |
| AWS ECS cluster deleted Beta | AWS CloudTrail | |
| AWS ElastiCache security group modified | AWS CloudTrail | |
| AWS GuardDuty threat list modified | AWS CloudTrail | |
| AWS IAM default policy version set | AWS CloudTrail | |
| AWS IAM group deleted | AWS CloudTrail | |
| AWS IAM login profile created | AWS CloudTrail | |
| AWS IAM login profile modified by a different identity than the owner | AWS CloudTrail | |
| AWS IAM permission boundary deleted | AWS CloudTrail | |
| AWS IAM policy modified | AWS CloudTrail | |
| AWS IAM role can assume roles in any account Beta | AWS CloudTrail | |
| AWS IAM user created with generic name | AWS CloudTrail | |
| AWS MFA device disabled | AWS CloudTrail | |
| AWS MFA device registered | AWS CloudTrail | |
| AWS RDS Deletion Protection disabled | AWS CloudTrail | |
| AWS RDS instance password changed | AWS CloudTrail | |
| AWS RDS security group created | AWS CloudTrail | |
| AWS Roles Anywhere trust anchor created with an external CA | AWS CloudTrail | |
| AWS Route 53 domain registered | AWS CloudTrail | |
| AWS Route 53 domain transfer lock disabled for an account | AWS CloudTrail | |
| AWS Route 53 domain transfer to an external account | AWS CloudTrail | |
| AWS Route 53 public hosted zone created | AWS CloudTrail | |
| AWS S3 Block Public Access disabled for a bucket | AWS CloudTrail | |
| AWS S3 Block Public Access disabled for an account | AWS CloudTrail | |
| AWS S3 bucket configured with short retention period Beta | AWS CloudTrail | |
| AWS S3 bucket versioning suspended | AWS CloudTrail | |
| AWS S3 server access logging disabled | AWS CloudTrail | |
| AWS S3 static website hosting enabled Beta | AWS CloudTrail | |
| AWS SES service modified | AWS CloudTrail | |
| AWS SSO access token created | AWS CloudTrail | |
| AWS System Manager encrypted parameter retrieved | AWS CloudTrail | |
| AWS access key created | AWS CloudTrail | |
| AWS account closed | AWS CloudTrail | |
| AWS account created | AWS CloudTrail | |
| AWS account password policy changed | AWS CloudTrail | |
| AWS role assumed by an external principal with an unexpected user agent | AWS CloudTrail | |
| AWS root password recovery request | AWS CloudTrail | |
| AWS security group modification allowing access from any IP address | AWS CloudTrail | |
| Adversary simulation traffic to a benign destination | DNS, IP, HTTP | |
| Anomalous GitHub repository download | GitHub | |
| Confluence page restrictions bypassed with an admin key Beta | Confluence | |
| Connection to an AWS EC2 instance using EC2 Instance Connect | AWS CloudTrail | |
| Encrypted DNS traffic to a common destination | DNS, IP, HTTP | |
| Enumeration of AWS EC2 instance startup scripts | AWS CloudTrail | |
| GitHub Dependabot repository access changed | GitHub | |
| GitHub Dependabot vulnerability alerts disabled | GitHub | |
| GitHub Enterprise account deleted | GitHub | |
| GitHub Enterprise account owner added | GitHub | |
| GitHub Enterprise recovery codes accessed | GitHub | |
| GitHub IP allow list modified | GitHub | |
| GitHub OAuth application access restrictions disabled | GitHub | |
| GitHub OAuth secret removed | GitHub | |
| GitHub Personal Access Token approval policy modified | GitHub | |
| GitHub SSH certificate authority created | GitHub | |
| GitHub SSH certificate authority deleted | GitHub | |
| GitHub SSH certificate requirement disabled | GitHub | |
| GitHub SSO configuration modified for organization or Enterprise account | GitHub | |
| GitHub account recovery codes accessed | GitHub | |
| GitHub application installed | GitHub | |
| GitHub audit log stream modified | GitHub | |
| GitHub branch protection policy changed | GitHub | |
| GitHub organization member updated | GitHub | |
| GitHub organization moderators changed | GitHub | |
| GitHub organization recovery codes accessed | GitHub | |
| GitHub organization removed from an Enterprise account | GitHub | |
| GitHub payment method removed | GitHub | |
| GitHub repository archived | GitHub | |
| GitHub repository deleted | GitHub | |
| GitHub repository deploy key modified or created | GitHub | |
| GitHub repository ruleset modified | GitHub | |
| GitHub self hosted runner registered | GitHub | |
| GitHub team changed | GitHub | |
| GitHub user added to an organization | GitHub | |
| GitHub user blocked from accessing an organization’s repositories | GitHub | |
| GitHub user invited to a repository | GitHub | |
| GitHub user removed from a repository | GitHub | |
| GitHub user removed from an organization | GitHub | |
| GitHub user unblocked from accessing an organization’s repositories | GitHub | |
| GitHub webhook modified | GitHub | |
| IAM role attached to an AWS RDS instance | AWS CloudTrail | |
| Kubernetes API calls by a likely malicious caller Beta | Kubernetes | |
| Kubernetes API calls indicating access to secret Beta | Kubernetes | |
| Kubernetes API calls indicating namespace creation Beta | Kubernetes | |
| Kubernetes API calls indicating permission discovery Beta | Kubernetes | |
| Kubernetes pod with host network created Beta | Kubernetes | |
| Kubernetes user attached to pod Beta | Kubernetes | |
| Long AWS console session | AWS CloudTrail | |
| Low source port for outbound traffic | AWS CloudTrail | |
| MFA disabled for Slack organization | Slack | |
| Modification of an AWS EC2 instance startup script | AWS CloudTrail | |
| Multiple archived files uploaded to Slack in a short period | Slack | |
| New Okta API token generated | Okta | |
| Okta API calls indicating MFA modification | Okta | |
| Okta API calls indicating application modification | Okta | |
| Okta API calls indicating application sign on policy modification | Okta | |
| Okta API calls indicating identity provider creation | Okta | |
| Okta API calls indicating user creation | Okta | |
| Okta API calls indicating user profile modification | Okta | |
| Okta MFA challenge without MFA app Beta | Okta | |
| Okta MFA number challenge failed | Okta | |
| Okta privilege granted | Okta | |
| Outbound traffic over SMB requiring investigation | IP | |
| Private Slack channel changed to public | Slack | |
| Quarantine self applied to AWS credentials | AWS CloudTrail | |
| Slack organization created | Slack | |
| Slack user role changed | Slack | |
| Successful 1Password login Beta | 1Password | |
| Successful AWS console login | AWS CloudTrail | |
| Successful AWS console logins from different locations in a short period | AWS CloudTrail | |
| Successful Okta user session created from different locations in a short period | Okta | |
| Traffic to a destination TLD commonly associated with malware | DNS, HTTP | |
| Traffic to a destination with a known HTTP open directory | DNS, IP, HTTP | |
| Traffic to a link-in-bio destination | DNS, HTTP | |
| Traffic to a user survey site | DNS, HTTP | |
| Traffic to an unknown young domain | DNS, HTTP | |
| Unsuccessful AWS console login attempt | AWS CloudTrail | |
| Use of AWS APIs by a likely malicious caller | AWS CloudTrail | |