This is a basic port scan of my droid using just nmap -P0 ip:
Starting Nmap 5.00 (
Nmap - Free Security Scanner For Network Exploration & Security Audits. ) at 2009-12-04 10:56 EST
Interesting ports on 86.sub-75-250-150.myvzw.com (75.250.150.86):
Not shown: 978 closed ports
PORT STATE SERVICE
22/tcp filtered ssh
42/tcp filtered nameserver
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
179/tcp filtered bgp
445/tcp filtered microsoft-ds
1023/tcp filtered netvenuechat
1075/tcp filtered unknown
1080/tcp filtered socks
1433/tcp filtered ms-sql-s
1434/tcp filtered ms-sql-m
1720/tcp filtered H.323/Q.931
2967/tcp filtered symantec-av
3128/tcp filtered squid-http
3306/tcp filtered mysql
4444/tcp filtered krb524
4899/tcp filtered radmin
6101/tcp filtered backupexec
6129/tcp filtered unknown
8081/tcp filtered blackice-icecap
9898/tcp filtered unknown
10000/tcp filtered snet-sensor-mgmt
Nmap done: 1 IP address (1 host up) scanned in 21.51 seconds
It looks like to me it's filtered on the droid...not on verizons end.