My proxy was found by script-kiddies, using port scanning, and is now in a lot of public proxy lists. While I advertise my proxy on my web site, I took great care to keep it OFF the myriad of public proxy lists, so I would not show up in any proxy blacklists. I thought that by keeping my proxy AWAY from ports 80, 81, 1080, 3128, 8000, 8080, 8081, 8118, or 9050, someone using proxy scanner would NOT find my proxy. I always thought that the hacker toolz for that scanned for open proxies would ONLY use those afforementioned ports, and proxies on ports other than those, would NOT be found by the script kiddies.
In the past hour or so, since my proxy appeared in some of the major lists, my server is been JUMPING with connections to my proxy, and many of them from corporate addresses ALL OVER the United States and Canada. From just ONE workplace, there have been DOZENS of connections going to my Tor entry proxy. I had 14 workers are one company, in New Hampshire, connecting to my proxy at once. This one company in NH that has a subscription online gaming service has 6 active connections to my proxy right now, as I am writing this. And these are INCOMING connections from their network into my proxy. Since its a Tor proxy, I don't know where the go beyond my machine, since I am only a Tor entry proxy, which allows people from any environment, where the machines are locked down, to be able to get onto the Tor network, without having to use the software. Anybody with an always-on connection can do this. You just simply install the Tor software, and configure it to be publicly accessible from anywhere in the world, and, voila!, you have an entry point onto the Tor network, allowing people to use Tor, without having to install the software.
I cannot figure out how my proxy could be found through scanning toolz, which I specifically keep it OFF the ports that proxies typically use, so that I will NOT be scanned, and appear in any of the proxy lists.