Thomas, unless someone comes up with a better way, I see a very tedious process.I would sequentially span each feed port that leads to/from another network device and look for the offending traffic.If it's found on a port, follow the link.If it's not...