Yesterday I just ran Shields Up firewall port just for fun and I was shocked, because I didn’t pass that test, although I have passed it since years from now. Now it says that some ports, that seems to be NetBIOS ports, are CLOSED, which were STEALTH about over a month ago, when I last time ran that test. I ran Malwarebytes with latest definitions and TDSSKiller and they found nothing. I also disabled NetBIOS. I use Avast Free and Windows Firewall.
Here’s the Shields Up log and I attached MBAM log as well.
GRC Port Authority Report created on UTC: 2014-01-02 at 13:39:58
Results from scan of ports: 0-1055
0 Ports Open
4 Ports Closed
1052 Ports Stealth
1056 Ports Tested
NO PORTS were found to be OPEN.
Ports found to be CLOSED were: 135, 136, 137, 445
Other than what is listed above, all ports are STEALTH.
TruStealth: FAILED - NOT all tested ports were STEALTH,
- NO unsolicited packets were received,
- NO Ping reply (ICMP Echo) was received.
Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them.
Only one of them will run on your system, that will be the right version.
[*]Double-click to run it. When the tool opens click Yes to disclaimer.
[*]Under Optional Scan ensure “List BCD” and “Driver MD5” are ticked.
[*]Press Scan button.
[*]It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
[*]The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
Now click on “Run” button. Wait for the programme completes his work.
All the tools we used should be gone.
Tool will create and open an log report (DelFix.txt) Note: The report will also be stored on C:\DelFix.txt
Yesterday I just ran Shields Up firewall port just for fun and I was shocked, [b]because I didn't pass that test[/b]
usually nothing to worry about .....
also when running this test it is the first firewall on the net that is tested....meaning if you are behind a router or ISP box with firewall then that is the one being tested and not your software firewall
if you after running the shields up test, scroll down the page and read the info below the probe result, you find this…and more
Detecting Ports Blocked by Your ISP
Internet service providers often block specific traffic entering their network before it reaches their customers, or after leaving their customers before it exits their network. This is sometimes done to block the exploitation of common security vulnerabilities, and sometimes to prevent their customers from offering proscribed Internet services.
As a customer, it can be useful and interesting to know which service ports, if any, an ISP has chosen to preemptively block in order to restrict their customers’ global Internet traffic.
ISP port blocking can be easily tested, often quite rapidly, by arranging to allow the ShieldsUP! probe to have access to an unprotected computer. Since all non-stealth machines will respond to every open request — either affirmatively or negatively — ports appearing as STEALTH will be those blocked by your ISP, corporate firewall, or other external agency.
If your system is unprotected, without any personal firewall or NAT router, any ports showing as stealth are being blocked somewhere between your computer and the public Internet. This is probably being done by your ISP. Internet traffic directed to your computer at the stealth ports will be dropped before reaching your machine.</blockquote>