Busca tu IP pública, utiliza nmap para hacer un escaneo de puertos a esa IP. Haz otro post en este hilo y copia los resultados.
En la imagen que pones parece solo indicar la presencia de tráfico en puertos dinámicos -->
http://en.wikipedia.org/wiki/Ephemeral_portPara saber bien haz lo que te dije al principio.
mira he descargado mnap y en target he puesto mi ip publica, intense scan, scan, le he dado a scan y me sale esto:
Starting Nmap 6.47 (
http://nmap.org ) at 2014-11-23 19:42 Hora estándar romance
WARNING: Could not import all necessary WinPcap functions. You may need to upgrade to version 3.1 or higher from
http://www.winpcap.org. Resorting to connect() mode -- Nmap may not function completely
NSE: Loaded 118 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 19:42
Only ethernet devices can be used for raw scans on Windows. Use
the --unprivileged option for this scan.
QUITTING!
__________________________
ya lo he solucionado, le faltaba instalr WinPcap, bueno me salen los datos, pero no te los voy a poner, porque sale mi ip publica
aqui lo tienes:
Starting Nmap 6.47 (
http://nmap.org ) at 2014-11-23 21:16 Hora estándar romance
NSE: Loaded 118 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 21:16
Scanning XX.XX.XX.XX [4 ports]
Completed Ping Scan at 21:16, 0.07s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:16
Completed Parallel DNS resolution of 1 host. at 21:16, 0.22s elapsed
Initiating SYN Stealth Scan at 21:16
Scanning XX.XX.XX.XX [65535 ports]
Discovered open port 80/tcp on XX.XX.XX.XX
Discovered open port 22/tcp on XX.XX.XX.XX
Discovered open port 21/tcp on XX.XX.XX.XX
Discovered open port 23/tcp on XX.XX.XX.XX
Discovered open port 8729/tcp on XX.XX.XX.XX
Discovered open port 8291/tcp on XX.XX.XX.XX
Discovered open port 2828/tcp on XX.XX.XX.XX
Discovered open port 2000/tcp on XX.XX.XX.XX
Completed SYN Stealth Scan at 21:17, 37.38s elapsed (65535 total ports)
Initiating Service scan at 21:17
Scanning 8 services on XX.XX.XX.XX
Completed Service scan at 21:19, 131.06s elapsed (8 services on 1 host)
Initiating OS detection (try #1) against XX.XX.XX.XX
Initiating Traceroute at 21:19
Completed Traceroute at 21:19, 0.01s elapsed
Initiating Parallel DNS resolution of 1 host. at 21:19
Completed Parallel DNS resolution of 1 host. at 21:19, 0.16s elapsed
NSE: Script scanning XX.XX.XX.XX.
Initiating NSE at 21:19
Completed NSE at 21:19, 30.39s elapsed
Nmap scan report for XX.XX.XX.XX
Host is up (0.0017s latency).
Not shown: 65527 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp MikroTik router ftpd 6.19
22/tcp open ssh MikroTik RouterOS sshd (protocol 2.0)
| ssh-hostkey:
|_ 1024 2d:af:0f:46:65:a0:4b:3b:24:82:b1:2a:4f:03:82:e5 (DSA)
23/tcp open telnet Linux telnetd
80/tcp open http MikroTik router config httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: RouterOS router configuration page
2000/tcp open bandwidth-test MikroTik bandwidth-test server
2828/tcp open http Web-Based Enterprise Management CIM serverOpenPegasus WBEM httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: Site doesn't have a title.
8291/tcp open unknown
8729/tcp open unknown
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10
Uptime guess: 14.140 days (since Sun Nov 09 17:58:04 2014)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=254 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: CPE - Mi nombre; OSs: Linux, RouterOS; Device: router; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 111/tcp)
HOP RTT ADDRESS
1 4.00 ms XX.XX.XX.XX
NSE: Script Post-scanning.
Initiating NSE at 21:19
Completed NSE at 21:19, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 203.91 seconds
Raw packets sent: 65581 (2.886MB) | Rcvd: 65598 (2.625MB)
en Profile: he seleccionado intense scan, all TCP ports y le dado a scan