@tonyshowoff said in Hello Mr Chinese IP based hacker:
That's why we set any WAN-fancing SSH port to something obscenely high like 41022, not for "security" but because of the logs. In fact, all of our sshd services run following that pattern, as does our internal HTTP(S) servers but the load balancers take in 80/443.
This prevents as many services as possible from running as root, which anything running port < 1024 does. I don't think most people even know this. At the very least if there's a NAT in play, one can always set ssh and web services ports much higher and just translate the ports to avoid the same issue.
(I know there are some work arounds like setcap on Linux, but in general this is the default behaviour on most machines)
For some reason this made me think of The Venture Bros, Hunter Gather says:
And we want your sad ass undercover agents to stop trying to infiltrate our group. Frankly we're tired of killing them and we can't afford the body bags!
Useful piece of information. Thanks!