Rick,
Far from trying to give you a (false) sense of safety
But remember: What you see is the POSITIVELY working firewall !
>>8 per min
>>
Plainly ignore accesses to DPT=135 ... at least until the last XP user has installed his patch.
>>closed-port hits I recorded were almost all on the FTP, Kazaa, and Bittorrent ports...
>>
Which probably says more about your other ISP customers then anything else .-)
Those accesses mostly try to contact the _previous_ user of your current IP
(or someone inside your net who did switch off his client

Now what's really left ?
Note1: Quiet a few "portscans" aren't really. If you have a user inside that frequents
IRC he/she will lead to a open-proxy scan of your server!
Note2: In my case I have a single user who's emails daily results in something that seems to be a portscan from somewhere else right afterwards ... but in reality they forward and another ip just identd's his mailer, then check that source for open proxies.
I agree with Ray that "dyndns" is most likely not to blame. After all the current ip you have (and which "they attack") is one out of the block of your isp and scanning "dyndns-records" doesn't seem to be among the hobbies of script kiddies...
The latter may (besides the popularity of some filesharing tools in certain countries winmx=japan, emule,bittorrent=germany kazaa=us,uk???) also be the reason why you find port accesses from certain countries. Script kiddies seldom will mess inside their home isp's block but rather try 212.73.244.51 in Crowthorne, Berkshire
or the like ...
Take care (and if you worry, worry about what you don't see M8 .-)