In your sample log, most of your hits are one and two, which usually fall below the threshold.
As I stated before, given enough hosts and enough time, yes, every port can be probed. If you have 100k bots out there, all it takes is one bot per port.
I have a single SSH port open through my firewall, as a failsafe if I ever need to get in (there have been times where I cannot get in, because where I am at is blocking the GRE protocol or some other port necessary to establish a VPN connection). In the past 7 years I have not had a single intrusion attempt. This is not to say it will never happen, but, its far easier to scan on known ports and less secure networks than it is to invest the time and effort on more secure networks.
Which is what I'd said earlier. You don't typically see a single machine scanning a full or large ranges of ports. The workload is distributed across many machines working together. The days of defending against some kid randomly sequentially scanning your ports are long over. Now it's a more ordered, comprehensive, distributed scanning of everything on the net by 10s of millions of bots. There's not really any hiding of things just by moving them up in port number. Because you have a secured encrypted login that hasn't been cracked isn't an equivalent case vs a cam with known vulnerabilities just hung off of a port forward and relying on nothing but the obscurity of a high port number to protect it.
If you watch your logs you can see how the scans are distributed. These are several related machines working together scanning from the same time period above. One tries 23389 then 3389, another transposes the numbers to check 3398, another 2664 then 2665, and on and on through a larger range of ports...
Sep 30 20:04:39 DROP SRC=5.188.10.108 DPT=23389
Sep 30 20:21:29 DROP SRC=5.188.86.39 DPT=3438
Sep 30 20:22:10 DROP SRC=5.188.203.55 DPT=2664
Sep 30 20:51:52 DROP SRC=5.188.10.108 DPT=3389
Sep 30 21:24:25 DROP SRC=5.188.203.55 DPT=2665
Sep 30 21:35:59 DROP SRC=5.188.10.12 DPT=3398
Then you'll also see more-intensive coordinated scans of ports testing for specific services/exploits:
Oct 1 4:15:54 DROP SRC=64.94.228.199 TTL=1 SPT=38173 DPT=33437
Oct 1 4:15:55 DROP SRC=64.94.228.199 TTL=2 SPT=38173 DPT=33438
Oct 1 4:15:56 DROP SRC=64.94.228.199 TTL=3 SPT=38173 DPT=33439
Oct 1 4:15:57 DROP SRC=64.94.228.199 TTL=4 SPT=38173 DPT=33440
Oct 1 4:15:59 DROP SRC=64.94.228.201 TTL=1 SPT=38179 DPT=33439
Oct 1 4:16:00 DROP SRC=64.94.228.201 TTL=2 SPT=38179 DPT=33440
Oct 1 4:16:01 DROP SRC=64.94.228.201 TTL=3 SPT=38179 DPT=33441
Oct 1 4:16:02 DROP SRC=64.94.228.201 TTL=4 SPT=38179 DPT=33442
Oct 1 4:16:04 DROP SRC=64.94.228.198 TTL=1 SPT=38174 DPT=33439
Oct 1 4:16:05 DROP SRC=64.94.228.198 TTL=2 SPT=38174 DPT=33440
Oct 1 4:16:06 DROP SRC=64.94.228.198 TTL=3 SPT=38174 DPT=33441
Oct 1 4:16:07 DROP SRC=64.94.228.198 TTL=4 SPT=38174 DPT=33442
Oct 1 4:16:09 DROP SRC=64.94.228.203 TTL=1 SPT=38178 DPT=33439
Oct 1 4:16:10 DROP SRC=64.94.228.203 TTL=2 SPT=38178 DPT=33440
Oct 1 4:16:11 DROP SRC=64.94.228.203 TTL=3 SPT=38178 DPT=33441
Oct 1 4:16:12 DROP SRC=64.94.228.203 TTL=4 SPT=38178 DPT=33442
Oct 1 4:16:14 DROP SRC=64.94.228.197 TTL=1 SPT=38175 DPT=33438
Oct 1 4:16:15 DROP SRC=64.94.228.197 TTL=2 SPT=38175 DPT=33439
Oct 1 4:16:16 DROP SRC=64.94.228.197 TTL=3 SPT=38175 DPT=33440
Oct 1 4:16:17 DROP SRC=64.94.228.197 TTL=4 SPT=38175 DPT=33441
Oct 1 4:16:19 DROP SRC=64.94.228.196 TTL=1 SPT=38176 DPT=33439
Oct 1 4:16:20 DROP SRC=64.94.228.196 TTL=2 SPT=38176 DPT=33440
Oct 1 4:16:21 DROP SRC=64.94.228.196 TTL=3 SPT=38176 DPT=33441
Oct 1 4:16:22 DROP SRC=216.52.192.118 TTL=1 SPT=32284 DPT=33439
Oct 1 4:16:22 DROP SRC=64.94.228.196 TTL=4 SPT=38176 DPT=33442
Oct 1 4:16:23 DROP SRC=216.52.192.118 TTL=2 SPT=32284 DPT=33440
Oct 1 4:16:24 DROP SRC=216.52.192.118 TTL=3 SPT=32284 DPT=33441
Oct 1 4:16:25 DROP SRC=216.52.192.118 TTL=4 SPT=32284 DPT=33442
Oct 1 4:16:27 DROP SRC=216.52.192.110 TTL=1 SPT=32290 DPT=33439
Oct 1 4:16:28 DROP SRC=216.52.192.110 TTL=2 SPT=32290 DPT=33440
Oct 1 4:16:29 DROP SRC=216.52.192.110 TTL=3 SPT=32290 DPT=33441
Oct 1 4:16:30 DROP SRC=216.52.192.110 TTL=4 SPT=32290 DPT=33442
Oct 1 4:16:32 DROP SRC=216.52.192.115 TTL=1 SPT=32285 DPT=33439
Oct 1 4:16:33 DROP SRC=216.52.192.115 TTL=2 SPT=32285 DPT=33440
Oct 1 4:16:34 DROP SRC=216.52.192.115 TTL=3 SPT=32285 DPT=33441
Oct 1 4:16:35 DROP SRC=216.52.192.115 TTL=4 SPT=32285 DPT=33442
Oct 1 4:16:37 DROP SRC=216.52.192.111 TTL=1 SPT=32289 DPT=33438
Oct 1 4:16:38 DROP SRC=216.52.192.111 TTL=2 SPT=32289 DPT=33439
Oct 1 4:16:39 DROP SRC=216.52.192.111 TTL=3 SPT=32289 DPT=33440
Oct 1 4:16:40 DROP SRC=216.52.192.111 TTL=4 SPT=32289 DPT=33441
Oct 1 4:16:42 DROP SRC=216.52.192.114 TTL=1 SPT=32286 DPT=33439
Oct 1 4:16:43 DROP SRC=64.94.1.176 TTL=1 SPT=38742 DPT=33439
Oct 1 4:16:43 DROP SRC=216.52.192.114 TTL=2 SPT=32286 DPT=33440
Oct 1 4:16:44 DROP SRC=64.94.1.176 TTL=2 SPT=38742 DPT=33440
Oct 1 4:16:44 DROP SRC=216.52.192.114 TTL=3 SPT=32286 DPT=33441
Oct 1 4:16:45 DROP SRC=64.94.1.176 TTL=3 SPT=38742 DPT=33441
Oct 1 4:16:45 DROP SRC=216.52.192.114 TTL=4 SPT=32286 DPT=33442
Oct 1 4:16:47 DROP SRC=64.94.1.176 TTL=4 SPT=38742 DPT=33442
Oct 1 4:16:48 DROP SRC=216.52.192.112 TTL=1 SPT=32288 DPT=33441
Oct 1 4:16:49 DROP SRC=64.94.1.170 TTL=1 SPT=38747 DPT=33438
Oct 1 4:16:49 DROP SRC=216.52.192.112 TTL=2 SPT=32288 DPT=33442
Oct 1 4:16:50 DROP SRC=64.94.1.170 TTL=2 SPT=38747 DPT=33439
Oct 1 4:16:50 DROP SRC=216.52.192.112 TTL=3 SPT=32288 DPT=33443
Oct 1 4:16:51 DROP SRC=64.94.1.170 TTL=3 SPT=38747 DPT=33440
Oct 1 4:16:51 DROP SRC=216.52.192.112 TTL=4 SPT=32288 DPT=33444
Oct 1 4:16:52 DROP SRC=64.94.1.170 TTL=4 SPT=38747 DPT=33441
Oct 1 4:16:53 DROP SRC=216.52.192.113 TTL=1 SPT=32287 DPT=33437
Oct 1 4:16:54 DROP SRC=64.94.1.175 TTL=1 SPT=38743 DPT=33437
Oct 1 4:16:54 DROP SRC=216.52.192.113 TTL=2 SPT=32287 DPT=33438
Oct 1 4:16:55 DROP SRC=64.94.1.175 TTL=2 SPT=38743 DPT=33438
Oct 1 4:16:55 DROP SRC=216.52.192.113 TTL=3 SPT=32287 DPT=33439
Oct 1 4:16:56 DROP SRC=64.94.1.175 TTL=3 SPT=38743 DPT=33439
Oct 1 4:16:56 DROP SRC=216.52.192.113 TTL=4 SPT=32287 DPT=33440
Oct 1 4:16:57 DROP SRC=64.94.1.175 TTL=4 SPT=38743 DPT=33440
Oct 1 4:16:59 DROP SRC=64.94.1.171 TTL=1 SPT=38746 DPT=33439
Oct 1 4:17:00 DROP SRC=64.94.1.171 TTL=2 SPT=38746 DPT=33440
Oct 1 4:17:01 DROP SRC=64.94.1.171 TTL=3 SPT=38746 DPT=33441
Oct 1 4:17:02 DROP SRC=64.94.1.171 TTL=4 SPT=38746 DPT=33442
Oct 1 4:17:04 DROP SRC=64.94.1.173 TTL=1 SPT=38744 DPT=33439
Oct 1 4:17:05 DROP SRC=64.94.1.173 TTL=2 SPT=38744 DPT=33440
Oct 1 4:17:06 DROP SRC=64.94.1.173 TTL=3 SPT=38744 DPT=33441
Oct 1 4:17:07 DROP SRC=64.94.1.173 TTL=4 SPT=38744 DPT=33442
Continuing for hours from other source IPs rolling through more ports in that same general high range...
This goes on all day, everyday, times thousands of different IPs originating from 10s of millions of bots continually scanning every IP out there. Anyone who monitors their logs will see the exact same thing. Put something vulnerable out there and it's just a matter of time before it will be found. Yes, you'll likely be found faster if you have the same vulnerable service/device on a known default port that's targeted but a high port number won't protect you.