I created a firewall using a Digital. Digital Ocean has GUI interface for adding a firewall to your droplet:

This was simple and easy to use, but then trying to access it on the terminal was a little harder. I ended up also manually installing ufw through the terminal, not allowing http or https requests. I knew my firewall was up and running when I checked the status and got active.

Next, I wanted to access my logs of who was trying to access my port. I went into my var/log/ufw.log and was able to see a list of sources and destinations with different protocols accessing different ports. This was really hard to see in so much text and I wanted to find an easier way to sift through all of this. First I saved it as a log file on my computer. I did this through performing the scp command to my root and saving it to my desktop. The "scp" command stands for secure copy, allowing me to copy files across an ssh connection (something i just learned).
$ scp root@###.###.###.###:/var/log/ufw.log .

Once I had my log files saved to my computer I wanted to parse the file so I could concentrate on looking at the SRC (who was trying to access) and the DPT (what port they were trying to come in on). All the destinations were to my droplet ip using TCP protocols. I used Jupyter notebooks to parse the file and then put them into an excel document where I could make out the information clearer.

Next, I went through all the ip's, listing where they were coming from. They were all mostly commercial and the vast majority of them were from China. I also notice that almost all (minus a few) of the China iP's access through port 80.
I interestingly got Digital Ocean twice, once from Clifton and the other from San Francisco. There were also some interesting companies on the logs such as hurricane electric , Alibaba, or "ISP/IXP IN CAMBODIA WITH THE BEST VERVICE IN THERE". I had only left my firewall active for a little over a day and already had a lot of logs to parse through. Below is my full log parsed on Excel:

Acknowledgements: I have to give a thanks to Tushar, Alden and Matt who all helped me with various bits along the way!