I used the tools here
https://pentest-tools.com/home to do a port scan on my public IP address:
I got these results:
Starting Nmap (
https://nmap.org ) at 2017-11-27 23:40 EET
Initiating Ping Scan at 23:40
Scanning <redacted public IP address> [4 ports]
Completed Ping Scan at 23:40, 0.22s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 23:40
Scanning <redacted IP address, DNS name> [100 ports]
Discovered open port 5009/tcp on <redacted public IP address>
Completed SYN Stealth Scan at 23:40, 1.86s elapsed (100 total ports)
[+] Nmap scan report for <redacted DNS name, public IP address>
Host is up (0.20s latency).
Not shown: 95 closed ports
PORT STATE SERVICE
5009/tcp open airport-admin
5631/tcp filtered pcanywheredata
6000/tcp filtered X11
6646/tcp filtered unknown
10000/tcp filtered snet-sensor-mgmt
Nmap done: 1 IP address (1 host up) scanned in 2.30 seconds
Raw packets sent: 165 (7.236KB) | Rcvd: 135 (5.396KB)
The last port is from the scanner itself. I did not know that 5009 was visible outside of my network.