@tortue:
Only path forward I can think of at the moment is a log rule and handling the log parsing and dedupe individually and using a FW alias for that deduped file.
Correct, that would be a way to do it, but it is a bit labor intensive to develop. I would challenge if the effort was worth the gain, though. The firewall is already going to drop inbound traffic that is unsolicited or that does not match an open port. Good operating practice says to keep all Internet-facing public services (web, email, etc.) well patched and hardened. Having an automated system that locks out an IP due to it attempting to connect to a single non-existent port could be an issue for a commercial enterprise. Suppose the user who is also a customer of yours just fat-fingered the hostname or accidentally used your hostname when he was trying to connect to another service (RDP perhaps) when he meant to use another. Now his IP will be blocked from any contact with your domain, including your web site.
Of course if you are strictly a home user, then none of the above matters to you. But at the same time, as a home user you likely have no public-facing services (and thus open ports), so why bother?
Bill