Mod Edit
These connections were inbound, NOT outbound.
This is nothing more than simple probing from external computer on an open port. This is normal for the Internet. Authentication from Channels DVR Server stops any of this probing and keep it safe.
- Mods
Hi everyone,
I’ve been noticing some unexpected outbound connection attempts from my Channels DVR instance, and I’m hoping someone can help clarify whether this is expected behavior or something I should be concerned about.
What I’m Seeing
Checking my logs, I found several 403 Forbidden responses for outbound HTTP GET and CONNECT requests to various IP addresses. Here are a few examples:
2025/02/12 23:13:33.731154 [HTTP] | 403 | 10.329514ms | 162.216.149.117 | GET "/"
2025/02/13 03:03:38.248828 [HTTP] | 403 | 11.738522ms | 194.48.251.26 | CONNECT ""
2025/02/13 03:03:38.467554 [HTTP] | 403 | 3.116849ms | 194.48.251.26 | CONNECT ""
2025/02/13 05:41:20.594449 [HTTP] | 403 | 7.218779ms | 204.93.227.26 | GET "/_security/public-proxy-check"
What I’ve Investigated So Far
• The IPs:
• 194.48.251.26 resolves to a hosting provider called “Cheapy.Host” in Bulgaria, which doesn’t seem related to Channels DVR.
• 204.93.227.26 appears to be associated with a datacenter (DEFT.COM) and seems to be related to proxy detection.
• 162.216.149.117 is unclear but could be another datacenter.
• The logs indicate that Channels DVR is attempting these outbound requests, but they are being blocked with 403 Forbidden responses. by my IPS system
• My instance is running on Unraid and is fully updated.
My Questions
-
Are these outbound requests expected behavior?
-
What would trigger Channels DVR to attempt a CONNECT request to 194.48.251.26?
-
Is the /security/public-proxy-check request a normal feature, and can it be disabled?
-
Has anyone else seen similar requests in their logs?
I want to make sure this is intended behavior and not something unexpected. Any insights from the community or the Channels DVR team would be greatly appreciated. Thanks in advance!

