Thanks Michael for analysing the logs. There is tcp health check configured on aws nlb for ports 1883 and 5672.
From consume_event_stream (rabbitmq-diagnostics-consume_event_stream.txt), it can be seen that client actually does connect over AMQP and sends data by opening channels but those connections are short lived and there are
connection.closed events which occurs after an RST packet which can be seen in the tcpdump (out.pcap) shared along with other logs. And malformed packet info is also available in tcpdump.
Sample event from the log file shared -
{"event":"connection.closed","client_properties":["{<<\"product\">>,longstr,<<\"RabbitMQ\">>}","{<<\"copyright\">>,longstr,<<\"Copyright (c) 2007-2016 Pivotal Software, Inc.\">>}","{<<\"capabilities\">>,table,[{<<\"exchange_exchange_bindings\">>,bool,true},{<<\"connection.blocked\">>,bool,true},{<<\"authentication_failure_close\">>,bool,true},{<<\"basic.nack\">>,bool,true},{<<\"publisher_confirms\">>,bool,true},{<<\"consumer_cancel_notify\">>,bool,true}]}","{<<\"information\">>,longstr,<<\"Licensed under the MPL. See
http://www.rabbitmq.com/\">>}","{<<\"version\">>,longstr,<<\"3.6.5\">>}","{<<\"platform\">>,longstr,<<\"Java\">>}"],"node":"rabbit@[nodename]","pid":"<rabbit@[nodename].1594647286.5862.0>","name":"[clientIP]:42430 -> [serverIP]:5672","timestamp_in_ms":1594647518376}