List top remote IP addresses most frequently attempting to exploit "Log4j 2" vulnerability against any of your internet-facing applications sitting behind HTTP(S) Load Balancer.
Category: Network Activity
Use Cases: Detect
Data Sources: HTTP(S) LB Logs
BigQuery | Log Analytics | Google SecOps |
---|---|---|
SQL | Contribute query | YARA-L |
No event generation steps provided. Contribute emulation test to this use case.
No log samples provided. Contribute log samples to this use case.