so, got an automated alert from my vps provider about unusual inbound traffic on my self-hosted wireguard setup. it's a clean digitalocean droplet, only port 51820 open for wireguard. the alert says 'probing activity detected' from a random ip block i don't recognize. i'm not panicking but i'm analyzing the logs now. everything else is locked down, fail2ban is running, key auth only. the part that bugs me is - if someone is just scanning for open wireguard ports, what's the actual risk? the protocol itself is secure, but a persistent scan feels like someone mapping out potential targets. my context: been running this setup for 8 months to route all my affiliate research traffic. never had an issue until this week. speed tests are still fine, no weird outbound connections logged. just curious if anyone else with a diy vpn sees this regularly and if i should just add a cloudflare tunnel in front to hide the ip entirely, even though that kinda defeats the point of controlling the whole stack. data shows about 3-5 scan attempts per day now, up from zero.