Akward ports listed and UDP packets.
So I decided to portscan myself last night. I recall portscanning myself a week ago and only having ports 113 open. Upon my scan I received this:
12345/tcp closed NetBus
12346/tcp closed NetBus
43188/tcp closed reachout
44334/tcp closed tinyfw
44442/tcp closed coldfusion-auth
44443/tcp closed coldfusion-auth
47557/tcp closed dbbrowse
49400/tcp closed compaqdiag
54320/tcp closed bo2k
There was more listed, but you get the idea. Why would these show up during an nmap? Are those a concern? Also I have been getting UDP packets constantly, and they look like this:
10:53:53.719437 IP hewlett-9por0s0.cen.cmsu.edu.1044 > 139.102.230.192.41170: UDP, length 19
10:54:03.110880 IP steveg.res.bgsu.edu.1815 > 139.102.230.192.41170: UDP, length 20
10:54:20.057222 IP dhcp-194-246.housing.utah.edu.1040 > 139.102.230.192.41170: UDP, length 19
10:06:53.307684 IP TANG-SIX-NINETY-EIGHT.MIT.EDU.4815 > 139.102.230.10.1148: UDP, length 80
There are hundreds of hosts of which I have all logged. Is something fishy going on here? I'm debating emailing abuse@ for these hosts.
|