We have received an Abuse alert activity that resembles a Denial of Service attack against remote hosts. Please find the details below.AWS Account: xxxxxxxxxxx <-------- This is the VMware shadow account.Instance Id: i-000000000000 <------- This is the instance ID of the VMware ESXi host the active NSX Edge is on.Report begin time: Report end time: Remote Ip: x.x.x.x <--------- This IP has been identified by AWS as a malicious source and the SDDC is communicating with it.Private Ip(s): x.x.x.x <--------- This will be the ESXi host the NSX Edge is on. This is reported as all traffic leaving VMC to AWS goes through the NSX Edge. This IP does not represent the problematic VM it only represents the network egress point for the environment.Public Ip(s): N/ARemote port(s): Total packets sent: Total bytes received: Total packets received: Actions Needed:Block all outbound TCP traffic going out to remote Ip: x.x.x.x
VMC on AWS
FIREWALL_PKTLOG: 123571f INET match DROP 13313 OUT 80 TCP x.x.x.x/5432->x.x.x.x/50635