- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detect an Impossible Travel event when a @userIdentity.type:
{{@userIdentity.type}}
uses an AWS EC2 access key and filter out VPNs and AWS Internal IPs.
The Impossible Travel detection type’s algorithm compares the GeoIP data of the last log and the current log to determine if the EC2 instance with @userIdentity.session_name:
{{@userIdentity.session_name}}
traveled more than 500km at over 1,000km/hr and used an AWS EC2 access key.
@userIdentity.accessKeyId:
{{@userIdentity.accessKeyId}}
for @userIdentity.session_name:
{{@userIdentity.session_name}}
instance should be used from {{@impossible_travel.triggering_locations.first_location.city}}, {{@impossible_travel.triggering_locations.first_location.country}}
and {{@impossible_travel.triggering_locations.second_location.city}}, {{@impossible_travel.triggering_locations.second_location.country}}
.{{@impossible_travel.triggering_locations.first_location.city}}, {{@impossible_travel.triggering_locations.first_location.country}}
and {{@impossible_travel.triggering_locations.second_location.city}}, {{@impossible_travel.triggering_locations.second_location.country}}
., then consider isolating the account and reset credentials.NOTE VPNs and other anonymous IPs are filtered out of this signal
@threat_intel.results.category:anonymizer
.