Ports can be used for any purpose. In this case it's likely that someone is using port 1894 for some other purpose....
To determine the culprit, you could simply block that traffic with your firewall and see who complains, or use a network sniffer like Ethereal to monitor traffic on that port and determine its true nature.
For more information
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Mike Chapple
The OWASP Top Ten list is not a compliance standard but a set of best practices for enterprises looking to boost Web app security. Here's how to get ...continue reading
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best ...continue reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.