Probably because most cheap low quality firewalls only handles port numbers up to about 1024 or 2048. DPT is destination port and that is 59482, usually there are network communication ports in that range that can if active be exploited.
In these low quality firewalls every DPT above 1024 or 2048 is freely sent through.
But our FW3 isn’t a low quality firewall and blocks all 65000+ (16bits addressable) TCP and UDP ports.
These online network port scanners scan specific registered communications ports like 22, 80, 443, 1194 and so on, and some random ports above 2048 to see what is returned and to know the quality of the firewall.
If a open port is discovered then the brute force intrusion or DoS attacks usually come as stage two on that specific port on that specific device.
Looks like a reply sent from the web server to the client behind the router.
It hits the reject target due to a possible transmission error for an incorrectly terminated connection, or a NAT traversal problem related to conntrack timeout/overflow.
This is a minor issue which may happen from time to time, but there's nothing to worry about unless it starts happening on each connection.