For the previous few months I usually see alerts on my Synology about SSH connection being blocked. Someone (right here a pleasant Chinese language man from 126.96.36.199) was trying to connect with my NAS with the basis account (Thankfully PermitRootLogin is disabled).
What I’m a bit anxious as a result of if I see a public handle right here, it means my NAS is one way or the other reachable from the web. Nonetheless all ports are closed on my entrance router, NAT is disabled, DMZ is disabled.
When I attempt to
nmap my router from the surface I get this :
$ nmap -Pn x.x.x.x Beginning Nmap 7.60 ( https://nmap.org ) at 2020-05-17 01:07 CEST Nmap scan report for x.x.x.x Host is up (0.012s latency). Not proven: 997 filtered ports PORT STATE SERVICE 113/tcp closed ident 2000/tcp open cisco-sccp 5060/tcp open sip Nmap carried out: 1 IP handle (1 host up) scanned in 8.23 seconds
So there isn’t any SSH entry level.
How wouldn’t it be technically attainable to see a public IPv4 handle trying to connect with my LAN NAS?