Replies: 3 comments 2 replies
-
Just realised I switched my phone over to 4G at the point of the 1.132.110.131 addresses, so that explains that. However, still puzzled about the messages to DoD |
Beta Was this translation helpful? Give feedback.
-
It is most likely to do with their remote discovery and NAT hole punching techniques. In the event a direct connection cannot be achieved a client will poll the registers at:
You can see from this that for this remote discovery to work the camera needs to do some things periodically
If you are using our dissector then the wireshark will show the packets for this type of communication as being of protocol |
Beta Was this translation helpful? Give feedback.
-
Thanks - I'd worked out most of that already, but it doesn't explain the DoD IP address. I haven't really looked at the Neolink code yet as I wanted to understand by watching the wire first. But I'll look now, what code implements the P2P as described above? |
Beta Was this translation helpful? Give feedback.
-
I've been viewing transactions on Wireshark and just noticed the camera initiating communication with a few IP addresses that puzzle me. Does anyone here know what's going on?
The camera is periodically sending a Baichuan protocol msg to 22.20.8.73
Whois says this is DoD Network Information Center
I also noticed a stream of messages being sent to 1.132.110.131
I also see a number of Baichuan login messages from that address.
Whois has this address as:
inetnum: 1.128.0.0 - 1.159.255.255
netname: TELSTRAINTERNET49-AU
I can't see any earlier Baichuan XML that sets up these addresses to use.
This is a new camera and since I'm sniffing it by making my Mac into an wifi access point (at which time I connect Mac to router over Ethernet), there isn't a lot of opportunity for it to be hacked as it usually doesn't have a network connection.
This is on a Uniden Solo+ camera (ie rebadged Argus 2).
Has anyone seen anything similar?
Beta Was this translation helpful? Give feedback.
All reactions