Server vulnerable to Log4J CVE-2021-44228. The reply originated from a backend server, the originating frontend server has been included in the report for reference.
It is critical to patch log4j or the application using since the issues is exploited in the wild and leads to RCE.
Received reply after a Log4j payload from this host Ping was received because of query value Reply took 5.015895713s Orignal request was to 22.214.171.124:9000 This event's HTTP and SSL details are preserved from the orignal request. Orignal reply: 5265636569766564207265706c792061667465722061204c6f67346a207061796c6f61642066726f6d207468697320686f73740a50696e67207761732072656365697665642062656361757365206f662071756572792076616c75650a5265706c7920746f6f6b20352e303135383935373133730a4f7269676e616c20726571756573742077617320746f2038312e3234362e31392e37393a393030300a54686973206576656e742773204854545020616e642053534c2064657461696c7320617265207072657365727665642066726f6d20746865206f7269676e616c20726571756573742e0a
Email from: firstname.lastname@example.org Dear, According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. Best regards. -- Cyber Security Incident Response Team | CSIRT Koning Albert II Laan 27, B-1030 Brussels