i notice that port check is available when requested or sniffed by a probe protocol through my IP and my router was not able to block this request. my question is how to configure this as my first line of defense? my ISP is pldt, i notice also other ISP when i request port check, my request is block by the the their ISP
does our isp have to implement first line of defense or its in our part to implement this?
Code:Starting Nmap 5.21 ( http://nmap.org ) at 2010-05-03 01:55 China Standard Time Nmap scan report for ---.----.---- (0.0.0.0) Host is up (0.0045s latency). rDNS record for 0.0.0.0 : 0.0.0.0.pldt.net Not shown: 988 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 80/tcp open http 110/tcp open pop3 443/tcp open https 5000/tcp open upnp 5001/tcp open commplex-link 5800/tcp open vnc-http 5900/tcp open vnc 8000/tcp open http-alt 8080/tcp open http-proxy TRACEROUTE (using port 256/tcp) HOP RTT ADDRESS 1 1.00 ms 0.0.0.0.pldt.net (0.0.0.0) Nmap done: 1 IP address (1 host up) scanned in 2.09 seconds




Reply With Quote
...