activity_dashboard_client_error_countactivity_dashboard_redirect_countactivity_dashboard_requests_by_bucketactivity_dashboard_requests_by_dayactivity_dashboard_requests_by_erroractivity_dashboard_requests_by_operationactivity_dashboard_requests_by_requesteractivity_dashboard_requests_by_source_ipactivity_dashboard_requests_by_status_categoryactivity_dashboard_server_error_countactivity_dashboard_success_countactivity_dashboard_top_10_error_urisactivity_dashboard_top_10_keysactivity_dashboard_top_10_successful_urisactivity_dashboard_total_requestss3_bucket_accessed_using_insecure_tls_versions3_object_accessed_outside_business_hourss3_object_accessed_using_insecure_tls_versions3_object_accessed_using_suspicious_user_agents3_object_accessed_with_large_request_sizes3_object_accessed_with_large_response_size
Query: s3_object_accessed_using_suspicious_user_agent
Usage
powerpipe query aws_s3_server_access_log_detections.query.s3_object_accessed_using_suspicious_user_agent
Tailpipe Tables
SQL
select tp_timestamp as timestamp, operation, bucket as resource, requester as actor, tp_source_ip as source_ip, tp_index as account_id, tp_id as source_id, http_status, error_code, *from aws_s3_server_access_logwhere operation in ( 'REST.GET.OBJECT', 'REST.PUT.OBJECT', 'REST.DELETE.OBJECT' ) and ( -- Command-line tools user_agent ilike '%curl%' or user_agent ilike '%wget%' or user_agent ilike '%python%' or user_agent ilike '%go-http%' or user_agent ilike '%ruby%' or user_agent ilike '%powershell%' or -- Known scanners and penetration testing tools user_agent ilike '%nuclei%' or user_agent ilike '%nmap%' or user_agent ilike '%burpsuite%' or user_agent ilike '%sqlmap%' or user_agent ilike '%nikto%' or user_agent ilike '%hydra%' or user_agent ilike '%metasploit%' or user_agent ilike '%gobuster%' or user_agent ilike '%dirbuster%' or -- Suspicious bots and crawlers user_agent ilike '%zgrab%' or user_agent ilike '%masscan%' or user_agent ilike '%googlebot%' or user_agent ilike '%baiduspider%' or -- Generic indicators user_agent ilike '%scanner%' or user_agent ilike '%exploit%' or user_agent ilike '%attack%' or user_agent is null )order by tp_timestamp desc;
Detections
The query is being used by the following detections: