1) FW without bells and whistles like that are simple software firewalls who's only job is to monitor
incoming/outgoing network connections. Windows FW is like that. What other category of software can monitor incoming/outgoing connections? Wireshark? others? they might
see traffic but do nothing to
stop traffic that is not allowed by the user.
2) You keep saying "how many inbound network attacks apply to normal home users" but you seem to think normal home users are somehow flying under the radar

what is your logic for that statement? Many victims of botnets ARE home users too. Especially weakly secured IoT devices despite being behind a router. Or even the router itself is vulnerable to exploit(s). How many home users do you think check for router firmware updates regularly and actually update the firmware? You are right that many home users dont bother looking at FW logs to see port scan attempts etc but thats because they dont need to, they leave it up to the FW to block malicious port scan etc attempts. A lot of cases the router will block port scan attempts by malicious users and they will move on to easier targets, which are likely other home networks that are misconfigured or unpatched against known exploits. It is likely that targeting a home user will be more fruitful to "hackers" because home users are more likely to have low protection or misconfigured protection or (biggest one i think)
unpatched software vulnerable to exploits or unpatched router firmware vulnerable to exploits.
You think only corporate/enterprise networks are targetted by malware writers or "hackers" ?? Most enterprise networks have IT security personnel employed to patch software and actively monitor networks for weird looking things. A lot harder to compromise the corp network than a home network who's admin password is the default password "admin" or something like that...which happens quite a bit (just google for network attack campaigns where some security researcher discovered this themselves...)
3) Remember Petya ransomware? It was a compromised update to a legit software MEDoc or something like that. How many other legit programs have been compromised in some way? It is not uncommon for legit software to become compromised by malicious intent... How many PDF or DOC files are weaponized and use MS office/word or Adobe? legit software that is connecting over network protocols to the internet to C&C server to download the malicious payload....
4) Probably not many home users will look at FW logs to see what happened because they depend on FW to keep them safe. They are not interested in looking at logs to see what is going on. They just assume FW will keep them safe regardless of what is going on. You or I or others here might look at ours but that is because we are not average joe who just wants internet to work while they watch youtube videos or netflix etc. If they have no FW at all then those users are wide open to port scans that are made every day.
Look at this:
46.239.104.127
186.210.127.116
89.153.27.124
5) Malware infections USE the network protocols to either spread to other computers on the network (wannacry or other worms etc) or USE network protocols to connect to C&C servers to download payloads or upload your encryption key or whatever. Without FW that will block connections that are known malicious or known exploited the user is fully exposed. If a user doesnt have any form of software FW then what is looking at the network protocols traffic and allowing/disallowing that based on rules?
You brought up Comodo FW, and users use Comodo FW because it performs that simple task of FW AND has HIPS/SB/etc so it performs more than 1 function. You could ONLY use Comodo FW setup properly (ex, CS settings) then be sufficiently protected without using any other security software. Why? It monitors network protocols traffic and allows/disallows at per rules AND performs other security functions.
you know phones or tablets or laptops with SIM card capabilities connected to 4G LTE cell tower networks still have an IP address right?
anything that has IP address can be scanned for vulnerabilities or exploits etc
I would say phones are even easier targets because they connect directly to internet not behind routers
how many google play apps have been found to secretly be spyware or malicious in some way?