Hello, I'm not sure I have clearly understand all the questions, but this may help you (I hope :).
The ports that are marked as open are ports from your box, so the only port that could be open are services you are running on your box. It may be httpd, or even X server ... To detect the scan, you can use a NIDS (like snort), or even a specific program that detect portscan (Like scanlogd from openwall.com). To block portscan you should install a firewall, to filter the incoming packet. In order to understand the way of portscanning, you should read the paper from Fyodor published in Phrack 51 (phrack.org) and called 'The art of port scanning'. For more help, just try google.com :) Have fun ... >Hello everyone. >I'm running FreeBSD 4.4 and i was doing a port scan of my self (from a >remote >box that i have legal access to) and i was getting a log of open ports from >nmap -sN and nmap -sX. I was wondering why i was getting all of these "open >ports" >and does any one know how to stop these scans from getting though? >and how do these scans work? >Thanks >Craig