Hi There! Vulnerability scanners often simulate traffic, including spoofing source IPs, to test network responses. It’s conceivable that your scanner at 10.20.18.47 is generating traffic with a spoofed source IP of 10.20.28.21 (the printer’s address) as part of its testing. The MX would log the spoofed IP in the event, but "View Client Details" would still point to the scanner’s real IP based on its MAC. You might want to review the scanner’s configuration or logs to see if it’s intentionally sending traffic from 10.20.28.21. Perhaps disconnect the scanner for a while and see if the logs are still there.
... View more