2 Answers
1
For Amazon EC2 console browser-based client, the IP is from the EC2 Instance Connect IP address range. You can validate this from the AWS IP address ranges JSON file and look for EC2_INSTANCE_CONNECT for your region. Example for us-east-1, the range is:
{
"ip_prefix": "18.206.107.24/29",
"region": "us-east-1",
"service": "EC2_INSTANCE_CONNECT",
"network_border_group": "us-east-1"
}
More details here: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-connect-set-up.html#ec2-instance-connect-setup-security-group
answered 2 days ago
1
To add to the above, check out this link would help you understand how: Using Amazon EC2 Instance Connect for SSH access to your EC2 Instances You could check the detail of the ec2-instance-connect RPM package for further.
Now:
- Do a quick what is my IP to see the public IP that you're using to access AWS services.
- upon connecting via EC2 instance connect, check out your cloudtrail log - look under event source "SendSSHPublicKey" (for details on when the SSH public keys are pushed to the instance); dig through the event record and you will see your IP in (1)
I hope that help
answered 2 days ago
thanks for the additional details
Relevant questions
IAM role needed to assign a security group to a running EC2 instance
asked 2 months agoMy Network Load Balancer is not enforcing the target Security group
asked 3 years agoHTTPS Security Group not allowing access to EC2 instance when tried using HTTPS URL
asked 2 months agoEC2 Instance Connect SSH source IP
asked 2 days agoConnect Windows 10 WorkSpace to Amazon Linux 2 EC2 Instance
asked 4 months agoEC2: telnet one instance from another instance
asked 7 months agoinbound rule of security group for EC2 Instance in private subnet
asked 8 months agoNetworking and Security Groups issue
asked 3 years agoCan't connect to EC2 with chained security groups
asked 7 months agoConnectivity issues across all ec2 related resources
asked 3 years ago
Thanks a lot!