I have seen my nginx error log is full of messages like this:
(*date*) [info] 69487#0: *1064573 peer closed connection in SSL handshake while SSL handshaking, client: 95.64.*.*, server: 0.0.0.0:443
(*date*) [info] 69487#0: *1064574 peer closed connection in SSL handshake (104: Connection reset by peer) while SSL handshaking, client: 95.162.*.*, server: 0.0.0.0:443
(*date*) [info] 69487#0: *1064572 peer closed connection in SSL handshake while SSL handshaking, client: 5.112.*.*, server: 0.0.0.0:443
(*date*) [info] 69487#0: *1064576 peer closed connection in SSL handshake (104: Connection reset by peer) while SSL handshaking, client: 188.211.*.*, server: 0.0.0.0:443
(*date*) [info] 69487#0: *1064578 peer closed connection in SSL handshake while SSL handshaking, client: 185.120.*.*, server: 0.0.0.0:443
(*date*) [info] 69487#0: *1064577 peer closed connection in SSL handshake while SSL handshaking, client: 5.126.*.*, server: 0.0.0.0:443
Note: I have anonymized dates and ip
The server log contains a lot of similar log lines. I have created a fail2ban rule to filter them all and after a day it has blackilisted more than 6000 ips. A quick look of some of them blacklisted shows that almost all are coming from Iran, but it not appears listed in https://www.abuseipdb.com.
Is this an attack? Or may be I have misconfigured the nginx server? If it is an attack, what type of attack it is? I need to know this to report the IP addresses if they are malicious.