External attackers likely could/would port scan and be able to identify the device