Port 161 on my (fairly old Ubee UVW3200) router is open. It seems to be a backdoor from the manufacturer. It is open in stealth.
Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-14 21:18 CET
Nmap scan report for my-IP.cable.dynamic.v4.ziggo.nl (my-IP)
Host is up (0.0030s latency).
PORT STATE SERVICE VERSION
161/udp open snmp Ambit Microsystems Corporation SNMPv3 server
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.42 seconds
I used some of the nmap snmp scripts to check it out, but it seems like it would take cracking for an unwanted guest to talk to this server. Ambit became part of Ubee and is part of HonHai or something. The router is property of my ISP, but they basically deny the result of the above nmap run in 5+ different ways: "you're not reading it right", "according to the owner of website you first used, this is a problem", "it's an old router", "old firmware is a good sign", "it's a port on your Mac that is open." So essentially, "move along, nothing to see here." I asked them to close it or to contact the manufacturer to do so. But, in the mean time, how can I a) crack this brute force b) close the port c) monitor all traffic on the port d) make sure the traffic from my Mac is still protected? Should I warn other people about my ISP? As far as I can tell, my Mac's 161/162 are closed and there is no snmp service running on my Mac. I think it would be best to monitor the port on the external IP address, since I can imagine that the router is internally configured to further mask something.