I am running Pi-hole for both DHCP and DNS. DHCP is switched off on my TP-Link Archer C9 router. Everything seems to work OK, however!
When running Bullguards IoT scanner at http://iotscanner.bullguard.com/, the results show that my network is accessible via the internet on port 4567 and am therefore vulnerable to attacks. If I switch back to my original configuration by removing Pi-hole and switching DHCP back ON on my router, then running Bullguards IoT scanner shows my network to be safe!
Being open to attack is obviously not desirable. Is this a Pi-hole problem or a Router (firewall) problem?
If the scanner is a web-based scanner, then it's probing your router and unless you have a DMZ that you've placed the Raspberry Pi in and are forwarding ports via your router or have the Raspberry Pi exposed to the internet, I don't know why you are getting a hit on that port. We can't access your router to change or open ports.
OK. I think I need to detach everything from my network to see what device (if any) is opening the port and try to determine what device is opening the port. This could take a while...
OK.
After reducing my network to Router, PC and Pi-hole, and various re-boots, I have come to the conclusion that there is a problem with the routers firmware. Even without Pi-hole I am now getting errors with a different port (7574) which I believe is a port normally used by ISP provided routers for remote configuration etc. Very strange as the router isn't an ISP supplied router!!! I guess the problem is something not being initialised properly and has shown itself due to reboot/re-powering the router.
Thanks for your help.
You could be right. Testing the ports that have shown errors using other on-line port testers show the ports to be closed, unless the bullguard (Shodan) one is more aggressive.