The discovered binding list of a port shows ARP snooped IP Addresses which belongs to another interface on the same virtual machine.
This behavior is seen in both NSX User Interface (UI) and REST APIs.
This issue occurs because the virtual machine sends out an ARP request/response on an interface with an IP address that belongs to another interface on the same virtual machine.
This behavior is possible if the virtual machine exhibits the ARP flux issue or any other related issue. While performing ARP snooping, NSX relies on the ARP packets seen in the data path. The IP addresses are snooped in the ARP packet and there is no way to verify its correctness.
This issue is resolved in VMware NSX-T Data Center 2.2.0.
Workaround:
Unconfigure and reconfigure the IP Discovery profile associated with the affected port so the discovered IP addresses can be flush on that port. This resets the discovered bindings.