Comments (6)
Hey
First of all, it seems to me, that you are running my fork of the script (You also starred my project which I appreciate 😄 ) and as @ubaransel does not merge my changes I consider it a fork and opened my own issue tracker.
Thanks for providing the debug log. I just tested it with my TV and it worked as I expected. In all my tests the TV listens on port 8080/tcp which is also the default of the script. A quick look into the auto discovery protocol SSDP did not show a way to specify the port but I probably overlooked that. It seems that your TV does not listen on that port … Do you have other LG devices in your network?
I increased the logging of the script. Can you update to the latest commit and provide the log? It will probably output a line like Location: http://192.168.23.223:1062/ can you go to that resource and provide the XML as well?
For my TV it looks like this:
# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://192.168.23.223:1062/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1.0 DLNADOC/1.50 Platinum/1.0.3.0
EXT:
USN: uuid:$UUID::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Thu, 01 Jan 1970 00:49:49 GMT
DLNADeviceName.lge.com: %5bTV%5d%5bLG%5d50PB660V-ZD
# DEBUG: Found device: 192.168.23.223
# INFO: Using device: 192.168.23.223 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: roap
# DEBUG: Got response: OK
# DEBUG: Using protocol: roap
# DEBUG: Pairing key from user XXXXXX
# DEBUG: Trying paring key: XXXXXX
# DEBUG: Session ID is XXXXXXXXXX
from lgcommander.
Thanks for the amazing support!
No this is the only LG device on the network.
I have tried your updated script, see the outputs below:
# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:2001/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT:
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 00:35:49 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV
# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: hdcp
[Errno 61] Connection refused
Requested XML
<?xml version="1.0" encoding="UTF-8"?>
<root xmlns="urn:schemas-upnp-org:device-1-0" xmlns:dlna="urn:schemas-dlna-org:device-1-0" xmlns:pnpx="http://schemas.microsoft.com/windows/pnpx/2005/11" xmlns:df="http://schemas.microsoft.com/windows/2008/09/devicefoundation">
<specVersion>
<major>1</major>
<minor>0</minor>
</specVersion>
<device>
<deviceType>urn:schemas-upnp-org:device:MediaRenderer:1</deviceType>
<friendlyName>LG Smart+ TV</friendlyName>
<manufacturer>LG Electronics.</manufacturer>
<manufacturerURL>http://www.lge.com</manufacturerURL>
<modelDescription>LG WebOSTV DMRplus</modelDescription>
<modelName>LG TV</modelName>
<modelURL></modelURL>
<modelNumber>1.0</modelNumber>
<serialNumber></serialNumber>
<UDN>uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02</UDN>
<pnpx:X_compatibleId>MS_DigitalMediaDeviceClass_DMR_V001</pnpx:X_compatibleId>
<pnpx:X_deviceCategory>MediaDevices</pnpx:X_deviceCategory>
<df:X_deviceCategory>Multimedia.DMR</df:X_deviceCategory>
<df:X_modelId>LG Digital Media Renderer TV</df:X_modelId>
<lge:X_LG_DLNA_DOC xmlns:lge="urn:lge-com:device-1-0">1.0</lge:X_LG_DLNA_DOC>
<dlna:X_DLNADOC xmlns:dlna="urn:schemas-dlna-org:device-1-0">DMR-1.50</dlna:X_DLNADOC>
<iconList>
<icon>
<mimetype>image/png</mimetype>
<width>191</width>
<height>191</height>
<depth>32</depth>
<url>/dmrIcon.png</url>
</icon>
</iconList>
<serviceList>
<service>
<serviceType>urn:schemas-upnp-org:service:AVTransport:1</serviceType>
<serviceId>urn:upnp-org:serviceId:AVTransport</serviceId>
<SCPDURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
<controlURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
<eventSubURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
</service>
<service>
<serviceType>urn:schemas-upnp-org:service:ConnectionManager:1</serviceType>
<serviceId>urn:upnp-org:serviceId:ConnectionManager</serviceId>
<SCPDURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
<controlURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
<eventSubURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
</service>
<service>
<serviceType>urn:schemas-upnp-org:service:RenderingControl:1</serviceType>
<serviceId>urn:upnp-org:serviceId:RenderingControl</serviceId>
<SCPDURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
<controlURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
<eventSubURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
</service>
</serviceList>
</device>
</root>
I also tried it by setting the port and protocol as arguments and got the following:
python3 lgcommander.py -p 2001 -P roap
# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:2001/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT:
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 00:40:32 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV
# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 2001/tcp
# DEBUG: No valid pairing key from user. Asking user …
# DEBUG: Request device to show key on screen.
# DEBUG: Device response was: Bad Request
Traceback (most recent call last):
File "lgcommander.py", line 316, in <module>
main()
File "lgcommander.py", line 282, in main
lg_remote.get_session_id(get_pairing_key_from_user(lg_remote))
File "lgcommander.py", line 207, in get_pairing_key_from_user
lg_remote.display_key_on_screen()
File "lgcommander.py", line 146, in display_key_on_screen
raise Exception(u"Network error: {}".format(http_response.reason))
Exception: Network error: Bad Request
Thanks again.
from lgcommander.
Sometimes when I run the command it's testing protocol 'hdcp' others it's 'roap'
# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:1078/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT:
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 01:18:18 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV
# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: roap
[Errno 61] Connection refused
from lgcommander.
Sometimes when I run the command it's testing protocol 'hdcp' others it's 'roap'
That is normal because both protocol names are stored in a dictionary (see code) and the order is optimized by Python internally.
It seems to me that your TV might use a unknown protocol. I know there is a application for Android which uses the protocol this script implements. To support this new protocol I would need a packet capture of the protocol at work (from the PIN part to actual commands being executed). Can you somehow provide that? If you have a rooted Android smartphone you can run tcpdump -i wlan0 -s 65536 -w capture_file.pcap 'host $hostname'
(replace "$hostname" with the hostname or the IP address of your TV) on it and get the pcap but that is just one way. Note: tcpdump seems to not be installed by default, so you would have to either chroot into a environment which includes it or something else. Maybe there also exists a program for Desktop computers or your can capture the traffic on your AP, depends on your environment …
from lgcommander.
I'm not sure how to do it on android but I have run it from my mac
The IP address of the TV is '10.0.1.6'
08:24:06.248400 IP 10.0.1.6.42069 > 10.0.1.3.52105: UDP, length 322
08:24:06.250369 IP 10.0.1.6.33780 > 10.0.1.3.58833: UDP, length 241
08:24:06.252269 IP 10.0.1.6.34351 > 10.0.1.3.52105: UDP, length 322
08:24:06.253558 IP 10.0.1.6.51081 > 10.0.1.3.52105: UDP, length 241
08:24:06.255239 IP 10.0.1.6.54353 > 10.0.1.3.52105: UDP, length 241
08:24:07.040930 ARP, Request who-has 10.0.1.3 tell 10.0.1.6, length 28
08:24:08.352850 IP 10.0.1.6.55888 > 10.0.1.3.57500: UDP, length 322
08:24:08.354012 IP 10.0.1.6.55781 > 10.0.1.3.57500: UDP, length 241
08:24:08.552047 IP 10.0.1.6.55781 > 10.0.1.3.57500: UDP, length 241
08:24:08.553482 IP 10.0.1.6.55888 > 10.0.1.3.57500: UDP, length 322
08:24:08.885697 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:24:16.258339 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:24:20.251805 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:25:39.597663 ARP, Request who-has 10.0.1.3 tell 10.0.1.6, length 28
08:25:41.271568 IP 10.0.1.6.50251 > 10.0.1.3.63267: UDP, length 378
08:25:41.273712 IP 10.0.1.3.61294 > 10.0.1.6.http-alt: Flags [S], seq 557352297, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154822471 ecr 0,sackOK,eol], length 0
08:25:41.284833 IP 10.0.1.6.http-alt > 10.0.1.3.61294: Flags [R.], seq 0, ack 557352298, win 0, length 0
08:25:41.472460 IP 10.0.1.6.50251 > 10.0.1.3.63267: UDP, length 378
08:25:41.472492 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 63267 unreachable, length 36
08:25:43.807572 IP 10.0.1.6.54895 > 10.0.1.3.65134: UDP, length 378
08:25:43.809543 IP 10.0.1.3.61295 > 10.0.1.6.http-alt: Flags [S], seq 3831555771, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154824999 ecr 0,sackOK,eol], length 0
08:25:43.812707 IP 10.0.1.6.http-alt > 10.0.1.3.61295: Flags [R.], seq 0, ack 3831555772, win 0, length 0
08:25:43.929754 IP 10.0.1.6.54895 > 10.0.1.3.65134: UDP, length 378
08:25:43.929788 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 65134 unreachable, length 36
08:25:45.035187 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 73
08:25:45.342414 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 73
08:25:45.342687 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 73
08:25:45.343011 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 73
08:25:45.343409 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 75
08:25:45.343689 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 75
08:25:45.344053 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 75
08:25:45.344253 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 75
08:25:45.394130 IP 10.0.1.3.53276 > 239.255.255.250.ssdp: UDP, length 129
08:25:46.878884 IP 10.0.1.6.36643 > 10.0.1.3.53276: UDP, length 378
08:25:46.880058 IP 10.0.1.6.36643 > 10.0.1.3.53276: UDP, length 378
08:25:46.880080 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 53276 unreachable, length 36
08:25:46.880287 IP 10.0.1.3.61296 > 10.0.1.6.http-alt: Flags [S], seq 966281295, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154828066 ecr 0,sackOK,eol], length 0
08:25:47.040176 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:47.040323 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
08:25:47.106082 IP 10.0.1.6.http-alt > 10.0.1.3.61296: Flags [R.], seq 0, ack 966281296, win 0, length 0
08:25:48.125450 IP 10.0.1.3.50128 > 239.255.255.250.ssdp: UDP, length 129
08:25:49.321182 IP 10.0.1.3.8310 > 239.255.255.250.ssdp: UDP, length 173
08:25:49.321344 IP 10.0.1.3.8310 > 239.255.255.250.ssdp: UDP, length 173
08:25:49.346145 IP 10.0.1.6.60406 > 10.0.1.3.50128: UDP, length 378
08:25:49.348356 IP 10.0.1.3.61297 > 10.0.1.6.http-alt: Flags [S], seq 2746138793, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154830529 ecr 0,sackOK,eol], length 0
08:25:49.351746 IP 10.0.1.6.http-alt > 10.0.1.3.61297: Flags [R.], seq 0, ack 2746138794, win 0, length 0
08:25:49.537328 IP 10.0.1.6.60406 > 10.0.1.3.50128: UDP, length 378
08:25:49.537393 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 50128 unreachable, length 36
08:25:50.497746 IP 10.0.1.3.63764 > 239.255.255.250.ssdp: UDP, length 129
08:25:51.486760 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.60992: Flags [F.], seq 927630036, ack 169967505, win 341, options [nop,nop,TS val 44649799 ecr 1154593359], length 0
08:25:51.486801 IP 10.0.1.3.60992 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4099, options [nop,nop,TS val 1154832662 ecr 44649799], length 0
08:25:51.569078 IP 10.0.1.6.37107 > 10.0.1.3.8310: UDP, length 322
08:25:51.767282 IP 10.0.1.6.37107 > 10.0.1.3.8310: UDP, length 322
08:25:51.799265 IP 10.0.1.6.35471 > 10.0.1.3.63764: UDP, length 378
08:25:51.801330 IP 10.0.1.3.61298 > 10.0.1.6.http-alt: Flags [S], seq 2988570240, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154832976 ecr 0,sackOK,eol], length 0
08:25:51.803722 IP 10.0.1.6.http-alt > 10.0.1.3.61298: Flags [R.], seq 0, ack 2988570241, win 0, length 0
08:25:51.998222 IP 10.0.1.6.35471 > 10.0.1.3.63764: UDP, length 378
08:25:51.998258 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 63764 unreachable, length 36
08:25:52.038084 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:52.038172 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
08:25:52.101119 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:25:52.408211 IP 74.125.203.95.http > 10.0.1.3.60994: Flags [F.], seq 4244157937, ack 1112810934, win 341, options [nop,nop,TS val 2743181629 ecr 1154594237], length 0
08:25:52.408253 IP 10.0.1.3.60994 > 74.125.203.95.http: Flags [.], ack 1, win 4115, options [nop,nop,TS val 1154833580 ecr 2743181629], length 0
08:25:52.511022 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.60999: Flags [F.], seq 2141150610, ack 3068376558, win 341, options [nop,nop,TS val 44616266 ecr 1154594498], length 0
08:25:52.511063 IP 10.0.1.3.60999 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154833682 ecr 44616266], length 0
08:25:52.574371 IP 10.0.1.6.42319 > 10.0.1.3.8310: UDP, length 241
08:25:52.770593 IP 10.0.1.6.42319 > 10.0.1.3.8310: UDP, length 241
08:25:52.950079 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61008: Flags [F.], seq 3071774315, ack 344899099, win 341, options [nop,nop,TS val 44634734 ecr 1154594917], length 0
08:25:52.950128 IP 10.0.1.3.61008 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4104, options [nop,nop,TS val 1154834120 ecr 44634734], length 0
08:25:52.964212 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61009: Flags [F.], seq 2260415583, ack 3748607181, win 341, options [nop,nop,TS val 44600632 ecr 1154594918], length 0
08:25:52.964248 IP 10.0.1.3.61009 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834134 ecr 44600632], length 0
08:25:53.005417 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61004: Flags [F.], seq 2793476741, ack 1596794305, win 341, options [nop,nop,TS val 44614709 ecr 1154594973], length 0
08:25:53.005459 IP 10.0.1.3.61004 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834175 ecr 44614709], length 0
08:25:53.009739 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61002: Flags [F.], seq 615629398, ack 1955805189, win 341, options [nop,nop,TS val 44634794 ecr 1154594975], length 0
08:25:53.009778 IP 10.0.1.3.61002 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834179 ecr 44634794], length 0
08:25:53.034616 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61006: Flags [F.], seq 4218730304, ack 2545910749, win 341, options [nop,nop,TS val 44600702 ecr 1154595003], length 0
08:25:53.034645 IP 10.0.1.3.61006 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834203 ecr 44600702], length 0
08:25:53.035807 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61003: Flags [F.], seq 170339386, ack 91015670, win 341, options [nop,nop,TS val 44404799 ecr 1154594992], length 0
08:25:53.035831 IP 10.0.1.3.61003 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834204 ecr 44404799], length 0
08:25:53.080238 IP syd10s01-in-f9.1e100.net.http > 10.0.1.3.61010: Flags [F.], seq 112039279, ack 2050544836, win 341, options [nop,nop,TS val 16113193 ecr 1154595026], length 0
08:25:53.080272 IP 10.0.1.3.61010 > syd10s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834248 ecr 16113193], length 0
08:25:53.148511 IP 10.0.1.3.64409 > google-public-dns-a.google.com.domain: 23653+ PTR? 105.220.58.216.in-addr.arpa. (45)
08:25:53.233597 IP 64.233.187.132.http > 10.0.1.3.61007: Flags [F.], seq 759306639, ack 2715530144, win 341, options [nop,nop,TS val 2899756312 ecr 1154595272], length 0
08:25:53.233655 IP 10.0.1.3.61007 > 64.233.187.132.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834401 ecr 2899756312], length 0
08:25:53.319017 IP google-public-dns-a.google.com.domain > 10.0.1.3.64409: 23653 2/0/0 PTR syd10s01-in-f9.1e100.net., PTR syd10s01-in-f9.1e100.net. (97)
08:25:53.369407 IP 10.0.1.3.62811 > google-public-dns-a.google.com.domain: 22024+ PTR? 132.187.233.64.in-addr.arpa. (45)
08:25:53.539048 IP google-public-dns-a.google.com.domain > 10.0.1.3.62811: 22024 NXDomain 0/1/0 (105)
08:25:53.576320 IP 10.0.1.6.51931 > 10.0.1.3.8310: UDP, length 241
08:25:53.583333 IP 10.0.1.6.48537 > 10.0.1.3.8310: UDP, length 322
08:25:53.773032 IP 10.0.1.6.48537 > 10.0.1.3.8310: UDP, length 322
08:25:53.774181 IP 10.0.1.6.51931 > 10.0.1.3.8310: UDP, length 241
08:25:53.784710 IP 64.233.187.132.http > 10.0.1.3.61005: Flags [F.], seq 2369896569, ack 873278696, win 341, options [nop,nop,TS val 3027886443 ecr 1154595689], length 0
08:25:53.784754 IP 10.0.1.3.61005 > 64.233.187.132.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834952 ecr 3027886443], length 0
08:25:53.896305 IP syd01s19-in-f11.1e100.net.http > 10.0.1.3.61011: Flags [F.], seq 2629251843, ack 3477202315, win 341, options [nop,nop,TS val 900328418 ecr 1154595769], length 0
08:25:53.896348 IP 10.0.1.3.61011 > syd01s19-in-f11.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154835063 ecr 900328418], length 0
08:25:53.907105 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [P.], seq 2314821375:2314821440, ack 2844702970, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 65
08:25:53.907150 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154835073 ecr 44655536], length 0
08:25:53.908422 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [P.], seq 65:110, ack 1, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 45
08:25:53.908430 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [F.], seq 110, ack 1, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 0
08:25:53.908465 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.908482 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.908706 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.917733 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [P.], seq 3500077488:3500077533, ack 390422959, win 252, options [nop,nop,TS val 442331786 ecr 1154595794], length 45
08:25:53.917790 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [.], ack 45, win 4094, options [nop,nop,TS val 1154835083 ecr 442331786], length 0
08:25:53.918018 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [F.], seq 1, ack 45, win 4096, options [nop,nop,TS val 1154835083 ecr 442331786], length 0
08:25:53.918823 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [F.], seq 45, ack 1, win 252, options [nop,nop,TS val 442331786 ecr 1154595794], length 0
08:25:53.918846 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [F.], seq 1, ack 46, win 4096, options [nop,nop,TS val 1154835084 ecr 442331786], length 0
08:25:53.921156 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [.], ack 2, win 252, options [nop,nop,TS val 442331790 ecr 1154835083], length 0
08:25:53.921213 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [.], ack 46, win 4096, options [nop,nop,TS val 1154835086 ecr 442331790], length 0
08:25:53.923214 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [.], ack 2, win 358, options [nop,nop,TS val 44655553 ecr 1154835074], length 0
08:25:54.203258 IP 10.0.1.3.61298 > open.demonii.com.http: UDP, length 16
08:25:54.328997 IP 10.0.1.3.50674 > google-public-dns-a.google.com.domain: 35375+ PTR? 203.237.125.74.in-addr.arpa. (45)
08:25:54.358940 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [P.], seq 4059452535:4059452600, ack 1549807741, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 65
08:25:54.358983 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154835522 ecr 16111189], length 0
08:25:54.360168 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [P.], seq 65:110, ack 1, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 45
08:25:54.360178 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [F.], seq 110, ack 1, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 0
08:25:54.360214 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.360232 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.360453 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.374780 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [.], ack 2, win 379, options [nop,nop,TS val 16111205 ecr 1154835523], length 0
08:25:54.484434 IP google-public-dns-a.google.com.domain > 10.0.1.3.50674: 35375 1/0/0 PTR syd01s19-in-f11.1e100.net. (84)
08:25:54.487645 IP 10.0.1.3.62126 > google-public-dns-a.google.com.domain: 49057+ PTR? 173.213.101.150.in-addr.arpa. (46)
08:25:54.502546 IP google-public-dns-a.google.com.domain > 10.0.1.3.62126: 49057 NXDomain 0/1/0 (112)
08:25:54.546355 IP open.demonii.com > 10.0.1.3: ICMP open.demonii.com udp port http unreachable, length 52
08:25:54.558076 ARP, Request who-has 10.0.1.1 tell 10.0.1.2, length 28
08:25:54.694259 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [P.], seq 3578176056:3578176101, ack 2721719934, win 692, options [nop,nop,TS val 1504542357 ecr 1154596540], length 45
08:25:54.694268 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [F.], seq 45, ack 1, win 692, options [nop,nop,TS val 1504542357 ecr 1154596540], length 0
08:25:54.694311 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [.], ack 45, win 4094, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.694329 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [.], ack 46, win 4094, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.694591 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [F.], seq 1, ack 46, win 4096, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.697133 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [.], ack 2, win 692, options [nop,nop,TS val 1504542361 ecr 1154835855], length 0
08:25:55.173844 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [P.], seq 495442182:495442247, ack 2270917817, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 65
08:25:55.173883 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154836332 ecr 2976986874], length 0
08:25:55.175017 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [P.], seq 65:110, ack 1, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 45
08:25:55.175022 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [F.], seq 110, ack 1, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 0
08:25:55.175042 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.175056 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 111, win 4096, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.175215 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.331483 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [.], ack 2, win 460, options [nop,nop,TS val 2976987191 ecr 1154836333], length 0
08:25:55.468303 IP syd10s01-in-f1.1e100.net.http > 10.0.1.3.60993: Flags [F.], seq 3517182528, ack 29177228, win 350, options [nop,nop,TS val 16112681 ecr 1154597311], length 0
08:25:55.468380 IP 10.0.1.3.60993 > syd10s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154836625 ecr 16112681], length 0
08:25:55.509102 IP 10.0.1.3.50910 > google-public-dns-a.google.com.domain: 2360+ PTR? 84.72.194.173.in-addr.arpa. (44)
çx08:25:55.548703 IP 10.0.1.3.65269 > google-public-dns-a.google.com.domain: 44511+ PTR? 1.1.0.10.in-addr.arpa. (39)
08:25:55.563948 IP google-public-dns-a.google.com.domain > 10.0.1.3.65269: 44511 NXDomain 0/0/0 (39)
08:25:55.566730 IP 10.0.1.3.64311 > google-public-dns-a.google.com.domain: 38286+ PTR? 2.1.0.10.in-addr.arpa. (39)
08:25:55.581946 IP google-public-dns-a.google.com.domain > 10.0.1.3.64311: 38286 NXDomain 0/0/0 (39)
08:25:55.672625 IP google-public-dns-a.google.com.domain > 10.0.1.3.50910: 2360 1/0/0 PTR tf-in-f84.1e100.net. (77)
08:25:55.801812 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [P.], seq 3919794084:3919794149, ack 2824900822, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 65
08:25:55.801860 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154836956 ecr 44654261], length 0
08:25:55.803006 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [P.], seq 65:110, ack 1, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 45
08:25:55.803015 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [F.], seq 110, ack 1, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 0
08:25:55.803050 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.803074 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.803287 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.818196 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [.], ack 2, win 659, options [nop,nop,TS val 44654277 ecr 1154836957], length 0
08:25:57.036948 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:57.037164 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
c c08:25:59.524261 IP 10.0.1.3.61002 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44634794], length 0
08:25:59.524400 IP 10.0.1.3.60993 > syd10s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 16112681], length 0
08:25:59.524426 IP 10.0.1.3.60992 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4099, options [nop,nop,TS val 1154840674 ecr 44649799], length 0
08:25:59.524451 IP 10.0.1.3.60994 > 74.125.203.95.http: Flags [F.], seq 1, ack 1, win 4115, options [nop,nop,TS val 1154840674 ecr 2743181629], length 0
08:25:59.524478 IP 10.0.1.3.61010 > syd10s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 16113193], length 0
08:25:59.524500 IP 10.0.1.3.61008 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4104, options [nop,nop,TS val 1154840674 ecr 44634734], length 0
08:25:59.524517 IP 10.0.1.3.61009 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44600632], length 0
08:25:59.524533 IP 10.0.1.3.61006 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44600702], length 0
08:25:59.524553 IP 10.0.1.3.61007 > 64.233.187.132.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 2899756312], length 0
08:25:59.524572 IP 10.0.1.3.61005 > 64.233.187.132.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 3027886443], length 0
08:25:59.524591 IP 10.0.1.3.61004 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44614709], length 0
08:25:59.524608 IP 10.0.1.3.61003 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44404799], length 0
08:25:59.524633 IP 10.0.1.3.61011 > syd01s19-in-f11.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 900328418], length 0
08:25:59.524656 IP 10.0.1.3.60999 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44616266], length 0
08:25:59.539705 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61002: Flags [R], seq 615629399, win 0, length 0
08:25:59.540965 IP syd10s01-in-f1.1e100.net.http > 10.0.1.3.60993: Flags [R], seq 3517182529, win 0, length 0
08:25:59.540975 IP syd10s01-in-f9.1e100.net.http > 10.0.1.3.61010: Flags [R], seq 112039280, win 0, length 0
08:25:59.540982 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61003: Flags [R], seq 170339387, win 0, length 0
08:25:59.540988 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61009: Flags [R], seq 2260415584, win 0, length 0
08:25:59.542363 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61008: Flags [R], seq 3071774316, win 0, length 0
08:25:59.542375 IP syd01s19-in-f11.1e100.net.http > 10.0.1.3.61011: Flags [R], seq 2629251844, win 0, length 0
08:25:59.542382 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61004: Flags [R], seq 2793476742, win 0, length 0
08:25:59.542390 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61006: Flags [R], seq 4218730305, win 0, length 0
08:25:59.542396 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.60992: Flags [R], seq 927630037, win 0, length 0
08:25:59.542403 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.60999: Flags [R], seq 2141150611, win 0, length 0
08:25:59.675825 IP 74.125.203.95.http > 10.0.1.3.60994: Flags [.], ack 2, win 341, options [nop,nop,TS val 2743189035 ecr 1154840674], length 0
08:25:59.677735 IP 64.233.187.132.http > 10.0.1.3.61005: Flags [.], ack 2, win 341, options [nop,nop,TS val 3027892335 ecr 1154840674], length 0
08:25:59.679185 IP 64.233.187.132.http > 10.0.1.3.61007: Flags [.], ack 2, win 341, options [nop,nop,TS val 2899762758 ecr 1154840674], length 0
Many thanks
from lgcommander.
Is there maybe a application for mac which can control this TV? In this case a tcpdump from your mac would be sufficient, but for now, this does not help much. I am sorry. It only shows that you are trying to connect to your TV and it responds with a TCP reset:
08:25:41.273712 IP 10.0.1.3.61294 > 10.0.1.6.http-alt: Flags [S], seq 557352297, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154822471 ecr 0,sackOK,eol], length 0
08:25:41.284833 IP 10.0.1.6.http-alt > 10.0.1.3.61294: Flags [R.], seq 0, ack 557352298, win 0, length 0
You could also setup a VPN for the Android and then run tcpdump on the VPN end point. Unfortunately, I don’t know an easy solution to this … Maybe your Access Point is able to capture the traffic. FritzBox APs are known for this feature. Or maybe you can setup a adhoc network with your mac and connect with your Android to it? I don’t really know mac, but this could actually work …
from lgcommander.
Related Issues (11)
- Cannot Access EZ_ADJUST and IN START Menus HOT 1
- Errno 111 Connection refused HOT 14
- not supportett protocol on lg 2016 (webos 3.0)
- ./lgcommander.py Network error HOT 7
- lgcommander works intermittent HOT 1
- LG Service Menu code not working IRsendNEC Not declare in the scope
- HTTP call HOT 1
- lg_2012_commander and multiple screens HOT 15
- Under which license is your script? HOT 2
- In Start menu for 2012 LG's HOT 11
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from lgcommander.