Whois shows 64.41.200.101 is from
ssllabs.com. You might expect some
number of handshake errors, since ssllabs is probing for broken SSL
implementations, and it does this by making a large number of SSL
handshakes.
EOF just means that the SSL implementation tried to read the socket
but it was already closed. For example, that would happen if the
client was problem the SSL implementation but wasn't interested in
completing the connection. The unknown certificate is probably that a
probe was looking for broken client certificate implementations.
There are also a lot of people scanning the whole internet (e.g,
https://zmap.io/). It has been said that it is possible to get a
packet back from every machine on the IPv4 internet in five
minutes from one (well connected) machine these days.
Long story short, if you have something listening on the public
internet, this is to be expected.