A client sent a bad hostname (or none at all) through SNI or the HTTP Host header.
RFC 6066 does not specify or even recommend any particular HTTP error in the case that the hostname sent via SNI (Server Name Indication) doesn't match the HTTP Host header.
It does recommend that the server abort the TLS handshake if the SNI hostname is not one that it provides service for.
From section 3:
It is recommended strongly against using a 502 (Bad Gateway) for this.
192.168.50.106 52620 209.53.113.223