Ports can be used for any purpose. In this case it's likely that someone is using port 1894 for some other purpose....
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
To determine the culprit, you could simply block that traffic with your firewall and see who complains, or use a network sniffer like Ethereal to monitor traffic on that port and determine its true nature.
For more information
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Mike Chapple
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.