Yeah, I enabled that as well on .2206... I was wondering then what it could find.
It's an industrial-strength router, I won't say which make/model, but it cost Au$250 about 3 years ago. I'm using WPA2, with a "very strong" PSK, "nearly as strong" Admin password, absurdly long randomly generated SSID which is hidden, WPS disabled and strict MAC binding. My router also disables SIP/ALG NAT Traversal by default for VoIP. HMS has not asked me for the Admin password, so it can't get in that way to suss the works, I guess it must phone home to get some server to see what it can find.
HNS is unable to get into the router even when I'm running Soulseek, telling me that my network "is not visible from the internet" and the router "is configured correctly". I was fairly sure when I enabled HNS that it would tell me these things...
So I do have to wonder where the leaks in your system are. For example,
(It also says this may be a false positive from port forwarding...)
When i'm running Soulseek or uTorrent I have ports forwarded, but not with UPnP which I have never used because that holds UDP port 1900 open for BiDi traffic, plus any needed TCP ports.
Many routers and firewalls expose themselves as Internet Gateway Devices, allowing any local UPnP control point to perform a variety of actions, including retrieving the external IP address of the device, enumerate existing port mappings, and add or remove port mappings. By adding a port mapping, a UPnP controller behind the IGD can enable traversal of the IGD from an external address to an internal client.
(
From Wikipedia#UPnP).
Do you have UPnP enabled in your system? If so, I recommend
strongly that you disable it and do any port forwarding manually. That should solve many of your problems.
I wouldn't worry over the infection notices. Apart fom anything else, your router is probably running a Linux or Adroid OS...
Gordon.