The best way is to identify (in my opinion) the MAC of this "fake" server and try to locate where this MAC is connected.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.