TCP FIN Scan
Hackers use the TCP FIN scan to identify listening TCP port numbers based on how the target device reacts to a transaction close request for a TCP port (even though no connection may exist before these close requests are made). This type of scan can get through basic firewalls and boundary routers that filter on incoming TCP packets with the Finish (FIN) and ACK flag combination. The TCP packets used in this scan include only the TCP FIN flag setting.
If the target device's TCP port is closed, the target device sends a TCP RST packet in reply. If the target device's TCP port is open, the target device discards the FIN and sends no reply.
Analise o seu computador em busca de backdoors, pois há uma boa chance de que algum malware esteja chamando para casa. O Malwarebytes 'Anti-Malware é muito bom. Faça um exame completo .