I was scanning my own ip to practice using nmap (on a vm) and realised ive got an open dns unbound domain tcp port on 53 and im pretty sure thats not supposed to be open or visible? do i need to do something or is this normal because ive never seen it before n idk what it is. the prompt i used to check it out was nmap -sV -p53 --script=banner <redacted-ip> -v -oN VULN.txt. and this was the result: PORT STATE SERVICE VERSION
53/tcp open domain Unbound
Futhermore a seperate nmap scan revealed my firewall details but the dns port got filtered:
PORT STATE SERVICE VERSION
53/tcp filtered domain
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: firewall
Running: D-Link embedded
OS CPE: cpe:/h:dlink:dfl-700
OS details: D-Link DFL-700 firewall
Network Distance: 2 hops
(nmap -sS -sV -A -Pn -T4 --version-intensity 9 -p 53 --max-retries 20 --max-scan-delay 30 -f --max-parallelism 30 -v -oN test4.txt <redacted-ip>) was the prompt for that is this bad or is it not enough info to be exploited?