Shown below is the result I get with my notebook in the DMZ (using my web server on port 6112 instead of your game server):
Starting Nmap 5.00 ( »nmap.org ) at 2014-08-22 22:46 CEST
NSE: Loaded 0 scripts for scanning.
Initiating Ping Scan at 22:46
Scanning 69.137.72.214 [1 port]
Completed Ping Scan at 22:46, 0.22s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 22:46
Completed Parallel DNS resolution of 1 host. at 22:46, 0.00s elapsed
Initiating Connect Scan at 22:46
Scanning c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214) [1000 ports]
Discovered open port 8008/tcp on 69.137.72.214
Discovered open port 8800/tcp on 69.137.72.214
Discovered open port 6112/tcp on 69.137.72.214
Completed Connect Scan at 22:47, 23.44s elapsed (1000 total ports)
Host c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214) is up (0.15s latency).
Interesting ports on c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214):
Not shown: 997 filtered ports
PORT STATE SERVICE
6112/tcp open dtspc
8008/tcp open http
8800/tcp open unknown
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 23.92 seconds
Raw packets sent: 1 (28B) | Rcvd: 1 (28B)
Shown below is the result I get with my notebook with only port 6112 forwarded to my web server on port 6112:
Starting Nmap 5.00 ( »nmap.org ) at 2014-08-22 23:06 CEST
NSE: Loaded 0 scripts for scanning.
Initiating Ping Scan at 23:06
Scanning 69.137.72.214 [1 port]
Completed Ping Scan at 23:06, 0.22s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:06
Completed Parallel DNS resolution of 1 host. at 23:06, 0.00s elapsed
Initiating Connect Scan at 23:06
Scanning c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214) [1000 ports]
Connect Scan Timing: About 20.00% done; ETC: 23:09 (0:02:04 remaining)
Discovered open port 6112/tcp on 69.137.72.214
Discovered open port 8800/tcp on 69.137.72.214
Completed Connect Scan at 23:07, 56.85s elapsed (1000 total ports)
Host c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214) is up (0.16s latency).
Interesting ports on c-69-137-72-214.hsd1.tn.comcast.net (69.137.72.214):
Not shown: 998 filtered ports
PORT STATE SERVICE
6112/tcp open dtspc
8800/tcp open unknown
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 57.33 seconds
Raw packets sent: 1 (28B) | Rcvd: 1 (28B)
If you don't see port 6112 open on the above test site, then either your game is not actually using port 6112, or the game is not actually configured to be a server, or there is a software firewall (or other security software) on the host PC that is blocking port 6112.
A troubleshooting step you can try if the above test does not show port 6112 open is to open a command prompt window and use the built-in netstat utility to find out if your game server is actually listening on port 6112. Here is my result from doing that:
C:\>netstat -ano
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 1932
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1128
TCP 0.0.0.0:443 0.0.0.0:0 LISTENING 1932
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:1026 0.0.0.0:0 LISTENING 1932
TCP 0.0.0.0:1029 0.0.0.0:0 LISTENING 1272
TCP 0.0.0.0:1801 0.0.0.0:0 LISTENING 1272
TCP 0.0.0.0:2103 0.0.0.0:0 LISTENING 1272
TCP 0.0.0.0:2105 0.0.0.0:0 LISTENING 1272
TCP 0.0.0.0:2107 0.0.0.0:0 LISTENING 1272
TCP 0.0.0.0:5900 0.0.0.0:0 LISTENING 1328
TCP 0.0.0.0:6112 0.0.0.0:0 LISTENING 1932
TCP 0.0.0.0:8008 0.0.0.0:0 LISTENING 1932
TCP 0.0.0.0:8023 0.0.0.0:0 LISTENING 2180
TCP 127.0.0.1:1025 127.0.0.1:1027 ESTABLISHED 816
TCP 127.0.0.1:1027 127.0.0.1:1025 ESTABLISHED 1328
TCP 127.0.0.1:1032 127.0.0.1:1033 ESTABLISHED 1328
TCP 127.0.0.1:1033 127.0.0.1:1032 ESTABLISHED 1328
TCP 127.0.0.1:4494 127.0.0.1:4495 ESTABLISHED 1532
TCP 127.0.0.1:4495 127.0.0.1:4494 ESTABLISHED 1532
TCP 192.168.10.16:139 0.0.0.0:0 LISTENING 4
TCP 192.168.10.16:1199 64.91.230.234:443 ESTABLISHED 1532
TCP 192.168.10.16:1210 64.91.230.234:443 ESTABLISHED 1532
TCP 192.168.10.16:1212 199.188.202.39:443 TIME_WAIT 0
TCP [::]:135 [::]:0 LISTENING 1128
TCP [::]:1026 [::]:0 LISTENING 1932
TCP [::]:1029 [::]:0 LISTENING 1272
TCP [::]:2103 [::]:0 LISTENING 1272
TCP [::]:2105 [::]:0 LISTENING 1272
TCP [::]:2107 [::]:0 LISTENING 1272
TCP [::]:5900 [::]:0 LISTENING 1328
TCP [::]:8023 [::]:0 LISTENING 2180
TCP [2601:5:1f00:8d8:217:a4ff:fee3:e7cf]:1703 [2400:cb00:2048:1::c629:d7b9]:80 TIME_WAIT 0
TCP [2601:5:1f00:8d8:217:a4ff:fee3:e7cf]:1704 [2400:cb00:2048:1::c629:d7b9]:80 TIME_WAIT 0
UDP 0.0.0.0:445 *:* 4
UDP 0.0.0.0:1028 *:* 1272
UDP 0.0.0.0:3456 *:* 1932
UDP 0.0.0.0:3527 *:* 1272
UDP 127.0.0.1:123 *:* 1340
UDP 192.168.10.16:123 *:* 1340
UDP 192.168.10.16:137 *:* 4
UDP 192.168.10.16:138 *:* 4
C:\>tasklist
Image Name PID Session Name Session# Mem Usage
========================= ====== ================ ======== ============
System Idle Process 0 0 28 K
System 4 0 22,692 K
smss.exe 548 0 432 K
avgrsx.exe 584 0 20,176 K
avgcsrvx.exe 624 0 46,084 K
csrss.exe 836 0 2,948 K
winlogon.exe 868 0 12,128 K
services.exe 912 0 9,840 K
lsass.exe 924 0 2,644 K
svchost.exe 1080 0 6,788 K
svchost.exe 1128 0 9,228 K
InCDsrv.exe 1196 0 6,760 K
svchost.exe 1340 0 55,348 K
svchost.exe 1384 0 7,324 K
WLTRYSVC.EXE 1404 0 4,856 K
BCMWLTRY.EXE 1416 0 12,000 K
spoolsv.exe 1468 0 13,876 K
ccs.exe 1536 0 9,056 K
msdtc.exe 1664 0 7,548 K
avgidsagent.exe 1724 0 19,952 K
avgwdsvc.exe 1736 0 20,052 K
BTNtService.exe 1752 0 6,132 K
svchost.exe 1892 0 5,944 K
inetinfo.exe 1932 0 15,192 K
TFService.exe 252 0 4,536 K
vncserver.exe 816 0 6,776 K
mqsvc.exe 1272 0 9,884 K
vncserver.exe 1328 0 9,116 K
explorer.exe 2600 0 46,964 K
mqtgsvc.exe 2700 0 6,952 K
vncserver.exe 3644 0 8,296 K
SynTPEnh.exe 3656 0 8,824 K
QLBCTRL.exe 3956 0 10,776 K
HP Wireless Assistant.exe 4052 0 9,880 K
smax4pnp.exe 4088 0 7,648 K
WLTRAY.EXE 2024 0 10,064 K
hpqWmiEx.exe 2572 0 8,288 K
InCD.exe 2740 0 6,264 K
TFTray.exe 2796 0 3,416 K
avgui.exe 2940 0 23,372 K
wmiprvse.exe 2972 0 9,228 K
ADU.exe 3068 0 8,240 K
ctfmon.exe 396 0 7,024 K
Dynamic DNS Client.exe 3300 0 37,744 K
qvp32.exe 3516 0 8,396 K
NetPerSec.exe 368 0 6,880 K
HPQTOA~1.EXE 2316 0 8,604 K
taskmgr.exe 3572 0 2,848 K
tlntsvr.exe 2180 0 7,736 K
cmd.exe 2380 0 1,644 K
seamonkey.exe 1532 0 149,248 K
sleep.exe 2712 0 4,848 K
cmd.exe 2880 0 5,740 K
tasklist.exe 2732 0 7,924 K
wmiprvse.exe 2860 0 9,672 K
The above two commands tell me that I do have a process that is listening on TCP port 6112, and that process is inetinfo.exe (the MS IIS web server application). You can also use the command
netstat -anb, but that takes longer to run, and its output is not as neat and easy to read.