---
title: HTTP requests containing Log4Shell JNDI injection patterns
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > HTTP requests containing Log4Shell JNDI
  injection patterns
---

# HTTP requests containing Log4Shell JNDI injection patterns
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1190-exploit-public-facing-application](https://attack.mitre.org/techniques/T1190) 
## Goal{% #goal %}

Detect HTTP requests containing Log4Shell-style JNDI lookup strings in the query string, path, headers, or user agent.

## Strategy{% #strategy %}

This rule monitors OCSF HTTP activity for JNDI injection patterns across multiple request attributes, grouped by `@ocsf.src_endpoint.ip`.

## Triage and response{% #triage-and-response %}

- Confirm whether affected systems run vulnerable Log4j versions and whether lookups could have been evaluated.
- Apply vendor patches or mitigations for affected production assets.
