Server Version: 1.31.0.6654 (Win 10)
Logs: Feb 20, 2023 07:13:31.826 [18084] DEBUG - Request: [34.159.24.105:33019 (WAN)] G - Pastebin.com
This is a direct copy/paste from a post I made on Reddit, here:
ORIGINAL POST/ISSUE BEGINS BELOW THE LINE
The conversation there basically ended with me needing to post here. Before I continue with the rest of the post, I’d like to make it clear that - unless I am gravely mistaken - this is not a case of “stupid thing guy forgot to do.” UPnP is off. Port forwarding is enabled only for the default (32400) Plex port and two other ports my system uses and are secure.
The ports being utilized for the requests shown in the long show as blocked/closed when I try to access them from outside my network.
Requests coming from verified users actively watching content seem to also utilize ports not open on my network; I would like to know the details of how this works and if it could be related to the issue at hand. For instance, here is a request from a family member three states away watching something on the server:
Request: [73.53..:44953 (WAN)] GET /:/timeline?key=%2Flibrary%2Fmetadata%2F163294&ratingKey=163294&state=playing&time=232112&duration=3544096&playbackTime=232956&playQueueItemID=900794&context=smarthub (18 live) #20990 TLS GZIP Signed-in Token (ang****)
What allows an incoming request to come in over port 44953? Aside from that - even if a port was open (which, again, they are not) why was this external address not affiliated with an authorized plex account allowed to continuously hit the server; and more importantly, why did the server attempt to execute each and every command? What’s up with that?
Anyways, here is the original post with the original issue:
The logs are long (a hundred times longer than what I was able to paste there), but if you look for “DEBUG - Request: [34.159.24.105” you’ll see the problem.
This is like 1%. I noticed this after a reboot (of the server application) and had multiple pages worth in a handful of minutes. I finally blocked the IP in Windows Firewall (I’m on a Windows server) and it seems to have stopped for now. A traceroute on the IP just shows it’s a Google Cloud customer. I sent the logs to their abuse team via the form they have, but that isn’t going to help right now.
So yeah - after manually blocking the IP in my OS Firewall it stopped, but how can I protect myself from this in the future? I’m curious as to why Plex is not only receiving but attempting to execute calls made to it from an external IP address. There must be some sort of issue with port forwarding for these to even make it to this system, right? This also confuses me, because I have exactly four ports forwarded and none of them were used by these requests.
What can I do to secure things and prevent this from happening? Honestly I’m pretty stumped as to how these requests are hitting the Plex Server in the first place. What do I do?
Edit: I’d rebooted the server because my web-based Console was not responding and would send a chunk and then be dead for a minute, repeating forever. I found that this was the problem, the hits are coming so fast that the console is overwhelmed.