Check your log and events viewer files (VPN, LAN, and WLAN). If NAT is configured on the network, check the NAT log files. Your log and events viewer files is the good place to start your analysis because it keeps track of processes, transaction, etc.
But if you don’t have an enable log files, it will be difficult to determine. But as a general security rule, always block ports that you’re not using on the network.