i notice that port check is available when requested or sniffed by a probe protocol through my IP and my router was not able to block this request. my question is how to configure this as my first line of defense? my ISP is pldt, i notice also other ISP when i request port check, my request is block by the the their ISP
does our isp have to implement first line of defense or its in our part to implement this?
Code:
Starting Nmap 5.21 ( http://nmap.org ) at 2010-05-03 01:55 China Standard Time
Nmap scan report for ---.----.---- (0.0.0.0)
Host is up (0.0045s latency).
rDNS record for 0.0.0.0 : 0.0.0.0.pldt.net
Not shown: 988 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
443/tcp open https
5000/tcp open upnp
5001/tcp open commplex-link
5800/tcp open vnc-http
5900/tcp open vnc
8000/tcp open http-alt
8080/tcp open http-proxy
TRACEROUTE (using port 256/tcp)
HOP RTT ADDRESS
1 1.00 ms 0.0.0.0.pldt.net (0.0.0.0)
Nmap done: 1 IP address (1 host up) scanned in 2.09 seconds