Repmgr.exe and Scanhost.exe communicate internally via IPC:port on a random netsh dynamic port that might conflict with another 3rd party application if it is designed to statically use a port from the dynamic port range.
Repmgr.exe and Scanhost.exe communicate information about scanning and debugging information as part of the normal product functionality.
It is an expected behavior that Repmgr.exe and Scanhost.exe communicate internally via IPC:port and that port number is chosen from the Microsoft netsh dynamic port range.
The Windows OS can list the dynamicport pool by using the following command in cmd prompt:
netsh int ipv4 show dynamicport tcp