I configured the server a couple of days ago on port 443 all works great.
But today when I looked at the logs for the past few days, there are the following entries a couple of times a day:
Code: Select all
2020-03-23 05:27:35.758 On the TCP Listener (Port 443), a Client (IP address X.X.X.X, Host name "scan-XX.security.ipip.net", Port number 48576) has connected.
2020-03-23 05:27:35.758 For the client (IP address: X.X.X.X, host name: "scan-XX.security.ipip.net", port number: 48576), connection "CID-104-DDAA7164A7" has been created.
2020-03-23 05:27:36.039 SSL communication for connection "CID-104-DDAA7164A7" has been started. The encryption algorithm name is "AES128-SHA".
2020-03-23 05:27:36.648 Connection "CID-104-DDAA7164A7" terminated by the cause "A client which is non-SoftEther VPN software has connected to the port." (code 5).
2020-03-23 05:27:36.648 Connection "CID-104-DDAA7164A7" has been terminated.
Are these just doing scans on random IP addresses to see what services are running on port 443? If I change the default port 443 to something else for clients to connect to, will these go away? :-)
Other source domains that I get entries for this are mailfind.host, rwth-aachen.de, stretchoid.com etc.
I am using Softether DDNS service, does that mean that my IP address with the DDNS hostname become public?
Thanks in Advance.
P.S.
I tried searching for this but I can't seem to get the search function to work, even if I enter just non-SoftEther then I get:
The following words in your search query were ignored because they are too common words: non softether.
You must specify at least one word to search for. Each word must consist of at least 3 characters and must not contain more than 14 characters excluding wildcards.