Answer- This article applies to all IAP's and version.
Below is the output from IAP-105 running version 188.8.131.52
00:24:6c:c8:68:98# show ap monitor ap-list | include 18:64:72:02:0a:10
18:64:72:02:0a:10 testing 149 rogue 80211a enable 121847/60295 67/0 wpa2-psk-aes 0 11 11 0 no
00:24:6c:c8:68:98# show snmp trap-queue | include 18:64:72:02:0a:10
2014-11-18 12:56:42 An AP (NAME 00:24:6c:c8:68:98 and MAC 00:24:6c:c8:68:98 on RADIO 1) classified an access point(BSSID 18:64:72:02:0a:10 and SSID testing on CHANNEL 149) as roguebecause it matched the MAC (00:00:00:00:00:00) with IP (0.0.0.0).
Below is the SNMP trap being sent to Airwave.