What kind of system are you scanning here? I know that on some (notably Redhat 7.2), firewalling is set up by default. When nmap finds a bunch of non-closed ports, it reports them as "interesting". UDP scanning is kind of tough, since it's "connectionless". But here's how nmap does it (from the man page):
Quote:
The technique is to send 0 byte udp
packets to each port on the target machine. If we receive an ICMP port
unreachable message, then the port is closed. Otherwise we assume it is
open.
This somewhat contradicts reality though, at least the way I see it. For example, I took a scan of an OpenBSD box (UDP only, default port selection), and it reported all 1453 ports as filtered. Go fig. Then again, it took 96 seconds on a 100base-t network on -T Insane, and reported the OS versions as "AIX 4.3.1 on a IBM RS/6000 R40"... Good ol' OBSD.
The best I can figure, is that if all ports are closed, it assumes it got no responses due to a packet filter - thus "filtered". But if you get at least one reply, the rest must just be closed... wild guess, though.
The important part though, is that you didn't see any open ports.
On a Linux system, you can also get a list of UDP ports with
netstat -au... that is, assuming you haven't been cracked into and had your netstat replaced...
Hope this helps a little.