Record information through the system — what method do you use?
Record information through the system — what method do you use?
There could be harmless devices causing the scan. Look for any unnoticed machines on your network. Tools like Wireshark can help analyze traffic. It might not be harmful, but it's wise to investigate.
Did the Norton/Symantec on the Mac assign the IP address? If yes, proceed to retrieve the MAC address by reviewing the ARP table on your Mac immediately after the alert, or check your router’s ARP and DHCP entries. With Smart or Managed switches you can begin tracing the MAC address. If you only have basic switches, accessing their MAC table isn’t possible. You can also search the MAC online to identify the hardware manufacturer, though this may not always pinpoint the exact device. If you have any network security devices (like Fing, firewalls, or routers), their scans are routine. Otherwise, you might be dealing with an infected machine or someone compromising your network.