Giter VIP home page Giter VIP logo

Comments (6)

ypid avatar ypid commented on July 3, 2024

Hey

First of all, it seems to me, that you are running my fork of the script (You also starred my project which I appreciate 😄 ) and as @ubaransel does not merge my changes I consider it a fork and opened my own issue tracker.
Thanks for providing the debug log. I just tested it with my TV and it worked as I expected. In all my tests the TV listens on port 8080/tcp which is also the default of the script. A quick look into the auto discovery protocol SSDP did not show a way to specify the port but I probably overlooked that. It seems that your TV does not listen on that port … Do you have other LG devices in your network?
I increased the logging of the script. Can you update to the latest commit and provide the log? It will probably output a line like Location: http://192.168.23.223:1062/ can you go to that resource and provide the XML as well?

For my TV it looks like this:

# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://192.168.23.223:1062/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1.0 DLNADOC/1.50 Platinum/1.0.3.0
EXT:
USN: uuid:$UUID::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Thu, 01 Jan 1970 00:49:49 GMT
DLNADeviceName.lge.com: %5bTV%5d%5bLG%5d50PB660V-ZD


# DEBUG: Found device: 192.168.23.223
# INFO: Using device: 192.168.23.223 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: roap
# DEBUG: Got response: OK
# DEBUG: Using protocol: roap
# DEBUG: Pairing key from user XXXXXX
# DEBUG: Trying paring key: XXXXXX
# DEBUG: Session ID is XXXXXXXXXX

from lgcommander.

wilkinsm89 avatar wilkinsm89 commented on July 3, 2024

Thanks for the amazing support!

No this is the only LG device on the network.

I have tried your updated script, see the outputs below:

# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:2001/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT: 
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 00:35:49 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV


# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: hdcp
[Errno 61] Connection refused

Requested XML

<?xml version="1.0" encoding="UTF-8"?>
<root xmlns="urn:schemas-upnp-org:device-1-0" xmlns:dlna="urn:schemas-dlna-org:device-1-0" xmlns:pnpx="http://schemas.microsoft.com/windows/pnpx/2005/11" xmlns:df="http://schemas.microsoft.com/windows/2008/09/devicefoundation">
  <specVersion>
    <major>1</major>
    <minor>0</minor>
  </specVersion>
  <device>
    <deviceType>urn:schemas-upnp-org:device:MediaRenderer:1</deviceType>
    <friendlyName>LG Smart+ TV</friendlyName>
    <manufacturer>LG Electronics.</manufacturer>
    <manufacturerURL>http://www.lge.com</manufacturerURL>
    <modelDescription>LG WebOSTV DMRplus</modelDescription>
    <modelName>LG TV</modelName>
    <modelURL></modelURL>
    <modelNumber>1.0</modelNumber>
    <serialNumber></serialNumber>
    <UDN>uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02</UDN>
    <pnpx:X_compatibleId>MS_DigitalMediaDeviceClass_DMR_V001</pnpx:X_compatibleId>
    <pnpx:X_deviceCategory>MediaDevices</pnpx:X_deviceCategory>
    <df:X_deviceCategory>Multimedia.DMR</df:X_deviceCategory>
    <df:X_modelId>LG Digital Media Renderer TV</df:X_modelId>
    <lge:X_LG_DLNA_DOC xmlns:lge="urn:lge-com:device-1-0">1.0</lge:X_LG_DLNA_DOC>
    <dlna:X_DLNADOC xmlns:dlna="urn:schemas-dlna-org:device-1-0">DMR-1.50</dlna:X_DLNADOC>
    <iconList>
      <icon>
        <mimetype>image/png</mimetype>
        <width>191</width>
        <height>191</height>
        <depth>32</depth>
        <url>/dmrIcon.png</url>
      </icon>
    </iconList>
    <serviceList>
      <service>
        <serviceType>urn:schemas-upnp-org:service:AVTransport:1</serviceType>
        <serviceId>urn:upnp-org:serviceId:AVTransport</serviceId>
        <SCPDURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
        <controlURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
        <eventSubURL>/AVTransport/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
      </service>
      <service>
        <serviceType>urn:schemas-upnp-org:service:ConnectionManager:1</serviceType>
        <serviceId>urn:upnp-org:serviceId:ConnectionManager</serviceId>
        <SCPDURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
        <controlURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
        <eventSubURL>/ConnectionManager/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
      </service>
      <service>
        <serviceType>urn:schemas-upnp-org:service:RenderingControl:1</serviceType>
        <serviceId>urn:upnp-org:serviceId:RenderingControl</serviceId>
        <SCPDURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/scpd.xml</SCPDURL>
        <controlURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/control.xml</controlURL>
        <eventSubURL>/RenderingControl/bd3bc4c4-8cec-a768-d18b-c360f4fb7b02/event.xml</eventSubURL>
      </service>
    </serviceList>
  </device>
</root>

I also tried it by setting the port and protocol as arguments and got the following:

python3 lgcommander.py -p 2001 -P roap
# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:2001/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT: 
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 00:40:32 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV


# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 2001/tcp
# DEBUG: No valid pairing key from user. Asking user …
# DEBUG: Request device to show key on screen.
# DEBUG: Device response was: Bad Request
Traceback (most recent call last):
  File "lgcommander.py", line 316, in <module>
    main()
  File "lgcommander.py", line 282, in main
    lg_remote.get_session_id(get_pairing_key_from_user(lg_remote))
  File "lgcommander.py", line 207, in get_pairing_key_from_user
    lg_remote.display_key_on_screen()
  File "lgcommander.py", line 146, in display_key_on_screen
    raise Exception(u"Network error: {}".format(http_response.reason))
Exception: Network error: Bad Request

Thanks again.

from lgcommander.

wilkinsm89 avatar wilkinsm89 commented on July 3, 2024

Sometimes when I run the command it's testing protocol 'hdcp' others it's 'roap'

# DEBUG: Returned: HTTP/1.1 200 OK
Location: http://10.0.1.6:1078/
Cache-Control: max-age=1800
Server: Linux/i686 UPnP/1,0 DLNADOC/1.50 LGE WebOS TV/Version 0.9
EXT: 
USN: uuid:bd3bc4c4-8cec-a768-d18b-c360f4fb7b02::urn:schemas-upnp-org:device:MediaRenderer:1
ST: urn:schemas-upnp-org:device:MediaRenderer:1
Date: Tue, 20 Jan 2015 01:18:18 GMT
DLNADeviceName.lge.com: LG%20Smart%2b%20TV


# DEBUG: Found device: 10.0.1.6
# INFO: Using device: 10.0.1.6 over transport protocol: 8080/tcp
# DEBUG: Detecting accepted protocol.
# DEBUG: Testing protocol: roap
[Errno 61] Connection refused

from lgcommander.

ypid avatar ypid commented on July 3, 2024

Sometimes when I run the command it's testing protocol 'hdcp' others it's 'roap'

That is normal because both protocol names are stored in a dictionary (see code) and the order is optimized by Python internally.

It seems to me that your TV might use a unknown protocol. I know there is a application for Android which uses the protocol this script implements. To support this new protocol I would need a packet capture of the protocol at work (from the PIN part to actual commands being executed). Can you somehow provide that? If you have a rooted Android smartphone you can run tcpdump -i wlan0 -s 65536 -w capture_file.pcap 'host $hostname' (replace "$hostname" with the hostname or the IP address of your TV) on it and get the pcap but that is just one way. Note: tcpdump seems to not be installed by default, so you would have to either chroot into a environment which includes it or something else. Maybe there also exists a program for Desktop computers or your can capture the traffic on your AP, depends on your environment …

from lgcommander.

wilkinsm89 avatar wilkinsm89 commented on July 3, 2024

I'm not sure how to do it on android but I have run it from my mac

The IP address of the TV is '10.0.1.6'

08:24:06.248400 IP 10.0.1.6.42069 > 10.0.1.3.52105: UDP, length 322
08:24:06.250369 IP 10.0.1.6.33780 > 10.0.1.3.58833: UDP, length 241
08:24:06.252269 IP 10.0.1.6.34351 > 10.0.1.3.52105: UDP, length 322
08:24:06.253558 IP 10.0.1.6.51081 > 10.0.1.3.52105: UDP, length 241
08:24:06.255239 IP 10.0.1.6.54353 > 10.0.1.3.52105: UDP, length 241
08:24:07.040930 ARP, Request who-has 10.0.1.3 tell 10.0.1.6, length 28
08:24:08.352850 IP 10.0.1.6.55888 > 10.0.1.3.57500: UDP, length 322
08:24:08.354012 IP 10.0.1.6.55781 > 10.0.1.3.57500: UDP, length 241
08:24:08.552047 IP 10.0.1.6.55781 > 10.0.1.3.57500: UDP, length 241
08:24:08.553482 IP 10.0.1.6.55888 > 10.0.1.3.57500: UDP, length 322
08:24:08.885697 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:24:16.258339 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:24:20.251805 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:25:39.597663 ARP, Request who-has 10.0.1.3 tell 10.0.1.6, length 28
08:25:41.271568 IP 10.0.1.6.50251 > 10.0.1.3.63267: UDP, length 378
08:25:41.273712 IP 10.0.1.3.61294 > 10.0.1.6.http-alt: Flags [S], seq 557352297, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154822471 ecr 0,sackOK,eol], length 0
08:25:41.284833 IP 10.0.1.6.http-alt > 10.0.1.3.61294: Flags [R.], seq 0, ack 557352298, win 0, length 0
08:25:41.472460 IP 10.0.1.6.50251 > 10.0.1.3.63267: UDP, length 378
08:25:41.472492 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 63267 unreachable, length 36
08:25:43.807572 IP 10.0.1.6.54895 > 10.0.1.3.65134: UDP, length 378
08:25:43.809543 IP 10.0.1.3.61295 > 10.0.1.6.http-alt: Flags [S], seq 3831555771, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154824999 ecr 0,sackOK,eol], length 0
08:25:43.812707 IP 10.0.1.6.http-alt > 10.0.1.3.61295: Flags [R.], seq 0, ack 3831555772, win 0, length 0
08:25:43.929754 IP 10.0.1.6.54895 > 10.0.1.3.65134: UDP, length 378
08:25:43.929788 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 65134 unreachable, length 36
08:25:45.035187 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 73
08:25:45.342414 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 73
08:25:45.342687 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 73
08:25:45.343011 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 73
08:25:45.343409 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 75
08:25:45.343689 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 75
08:25:45.344053 IP 10.0.1.6.9956 > 224.0.0.113.9956: UDP, length 75
08:25:45.344253 IP 10.0.1.6.9956 > 10.0.1.255.9956: UDP, length 75
08:25:45.394130 IP 10.0.1.3.53276 > 239.255.255.250.ssdp: UDP, length 129
08:25:46.878884 IP 10.0.1.6.36643 > 10.0.1.3.53276: UDP, length 378
08:25:46.880058 IP 10.0.1.6.36643 > 10.0.1.3.53276: UDP, length 378
08:25:46.880080 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 53276 unreachable, length 36
08:25:46.880287 IP 10.0.1.3.61296 > 10.0.1.6.http-alt: Flags [S], seq 966281295, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154828066 ecr 0,sackOK,eol], length 0
08:25:47.040176 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:47.040323 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
08:25:47.106082 IP 10.0.1.6.http-alt > 10.0.1.3.61296: Flags [R.], seq 0, ack 966281296, win 0, length 0
08:25:48.125450 IP 10.0.1.3.50128 > 239.255.255.250.ssdp: UDP, length 129
08:25:49.321182 IP 10.0.1.3.8310 > 239.255.255.250.ssdp: UDP, length 173
08:25:49.321344 IP 10.0.1.3.8310 > 239.255.255.250.ssdp: UDP, length 173
08:25:49.346145 IP 10.0.1.6.60406 > 10.0.1.3.50128: UDP, length 378
08:25:49.348356 IP 10.0.1.3.61297 > 10.0.1.6.http-alt: Flags [S], seq 2746138793, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154830529 ecr 0,sackOK,eol], length 0
08:25:49.351746 IP 10.0.1.6.http-alt > 10.0.1.3.61297: Flags [R.], seq 0, ack 2746138794, win 0, length 0
08:25:49.537328 IP 10.0.1.6.60406 > 10.0.1.3.50128: UDP, length 378
08:25:49.537393 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 50128 unreachable, length 36
08:25:50.497746 IP 10.0.1.3.63764 > 239.255.255.250.ssdp: UDP, length 129
08:25:51.486760 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.60992: Flags [F.], seq 927630036, ack 169967505, win 341, options [nop,nop,TS val 44649799 ecr 1154593359], length 0
08:25:51.486801 IP 10.0.1.3.60992 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4099, options [nop,nop,TS val 1154832662 ecr 44649799], length 0
08:25:51.569078 IP 10.0.1.6.37107 > 10.0.1.3.8310: UDP, length 322
08:25:51.767282 IP 10.0.1.6.37107 > 10.0.1.3.8310: UDP, length 322
08:25:51.799265 IP 10.0.1.6.35471 > 10.0.1.3.63764: UDP, length 378
08:25:51.801330 IP 10.0.1.3.61298 > 10.0.1.6.http-alt: Flags [S], seq 2988570240, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154832976 ecr 0,sackOK,eol], length 0
08:25:51.803722 IP 10.0.1.6.http-alt > 10.0.1.3.61298: Flags [R.], seq 0, ack 2988570241, win 0, length 0
08:25:51.998222 IP 10.0.1.6.35471 > 10.0.1.3.63764: UDP, length 378
08:25:51.998258 IP 10.0.1.3 > 10.0.1.6: ICMP 10.0.1.3 udp port 63764 unreachable, length 36
08:25:52.038084 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:52.038172 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
08:25:52.101119 IP 10.0.1.6 > igmp.mcast.net: igmp v3 report, 1 group record(s)
08:25:52.408211 IP 74.125.203.95.http > 10.0.1.3.60994: Flags [F.], seq 4244157937, ack 1112810934, win 341, options [nop,nop,TS val 2743181629 ecr 1154594237], length 0
08:25:52.408253 IP 10.0.1.3.60994 > 74.125.203.95.http: Flags [.], ack 1, win 4115, options [nop,nop,TS val 1154833580 ecr 2743181629], length 0
08:25:52.511022 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.60999: Flags [F.], seq 2141150610, ack 3068376558, win 341, options [nop,nop,TS val 44616266 ecr 1154594498], length 0
08:25:52.511063 IP 10.0.1.3.60999 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154833682 ecr 44616266], length 0
08:25:52.574371 IP 10.0.1.6.42319 > 10.0.1.3.8310: UDP, length 241
08:25:52.770593 IP 10.0.1.6.42319 > 10.0.1.3.8310: UDP, length 241
08:25:52.950079 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61008: Flags [F.], seq 3071774315, ack 344899099, win 341, options [nop,nop,TS val 44634734 ecr 1154594917], length 0
08:25:52.950128 IP 10.0.1.3.61008 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4104, options [nop,nop,TS val 1154834120 ecr 44634734], length 0
08:25:52.964212 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61009: Flags [F.], seq 2260415583, ack 3748607181, win 341, options [nop,nop,TS val 44600632 ecr 1154594918], length 0
08:25:52.964248 IP 10.0.1.3.61009 > syd09s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834134 ecr 44600632], length 0
08:25:53.005417 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61004: Flags [F.], seq 2793476741, ack 1596794305, win 341, options [nop,nop,TS val 44614709 ecr 1154594973], length 0
08:25:53.005459 IP 10.0.1.3.61004 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834175 ecr 44614709], length 0
08:25:53.009739 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61002: Flags [F.], seq 615629398, ack 1955805189, win 341, options [nop,nop,TS val 44634794 ecr 1154594975], length 0
08:25:53.009778 IP 10.0.1.3.61002 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834179 ecr 44634794], length 0
08:25:53.034616 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61006: Flags [F.], seq 4218730304, ack 2545910749, win 341, options [nop,nop,TS val 44600702 ecr 1154595003], length 0
08:25:53.034645 IP 10.0.1.3.61006 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834203 ecr 44600702], length 0
08:25:53.035807 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61003: Flags [F.], seq 170339386, ack 91015670, win 341, options [nop,nop,TS val 44404799 ecr 1154594992], length 0
08:25:53.035831 IP 10.0.1.3.61003 > syd09s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834204 ecr 44404799], length 0
08:25:53.080238 IP syd10s01-in-f9.1e100.net.http > 10.0.1.3.61010: Flags [F.], seq 112039279, ack 2050544836, win 341, options [nop,nop,TS val 16113193 ecr 1154595026], length 0
08:25:53.080272 IP 10.0.1.3.61010 > syd10s01-in-f9.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834248 ecr 16113193], length 0
08:25:53.148511 IP 10.0.1.3.64409 > google-public-dns-a.google.com.domain: 23653+ PTR? 105.220.58.216.in-addr.arpa. (45)
08:25:53.233597 IP 64.233.187.132.http > 10.0.1.3.61007: Flags [F.], seq 759306639, ack 2715530144, win 341, options [nop,nop,TS val 2899756312 ecr 1154595272], length 0
08:25:53.233655 IP 10.0.1.3.61007 > 64.233.187.132.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834401 ecr 2899756312], length 0
08:25:53.319017 IP google-public-dns-a.google.com.domain > 10.0.1.3.64409: 23653 2/0/0 PTR syd10s01-in-f9.1e100.net., PTR syd10s01-in-f9.1e100.net. (97)
08:25:53.369407 IP 10.0.1.3.62811 > google-public-dns-a.google.com.domain: 22024+ PTR? 132.187.233.64.in-addr.arpa. (45)
08:25:53.539048 IP google-public-dns-a.google.com.domain > 10.0.1.3.62811: 22024 NXDomain 0/1/0 (105)
08:25:53.576320 IP 10.0.1.6.51931 > 10.0.1.3.8310: UDP, length 241
08:25:53.583333 IP 10.0.1.6.48537 > 10.0.1.3.8310: UDP, length 322
08:25:53.773032 IP 10.0.1.6.48537 > 10.0.1.3.8310: UDP, length 322
08:25:53.774181 IP 10.0.1.6.51931 > 10.0.1.3.8310: UDP, length 241
08:25:53.784710 IP 64.233.187.132.http > 10.0.1.3.61005: Flags [F.], seq 2369896569, ack 873278696, win 341, options [nop,nop,TS val 3027886443 ecr 1154595689], length 0
08:25:53.784754 IP 10.0.1.3.61005 > 64.233.187.132.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154834952 ecr 3027886443], length 0
08:25:53.896305 IP syd01s19-in-f11.1e100.net.http > 10.0.1.3.61011: Flags [F.], seq 2629251843, ack 3477202315, win 341, options [nop,nop,TS val 900328418 ecr 1154595769], length 0
08:25:53.896348 IP 10.0.1.3.61011 > syd01s19-in-f11.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154835063 ecr 900328418], length 0
08:25:53.907105 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [P.], seq 2314821375:2314821440, ack 2844702970, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 65
08:25:53.907150 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154835073 ecr 44655536], length 0
08:25:53.908422 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [P.], seq 65:110, ack 1, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 45
08:25:53.908430 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [F.], seq 110, ack 1, win 358, options [nop,nop,TS val 44655536 ecr 1154595792], length 0
08:25:53.908465 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.908482 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.908706 IP 10.0.1.3.61014 > syd09s01-in-f1.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154835074 ecr 44655536], length 0
08:25:53.917733 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [P.], seq 3500077488:3500077533, ack 390422959, win 252, options [nop,nop,TS val 442331786 ecr 1154595794], length 45
08:25:53.917790 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [.], ack 45, win 4094, options [nop,nop,TS val 1154835083 ecr 442331786], length 0
08:25:53.918018 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [F.], seq 1, ack 45, win 4096, options [nop,nop,TS val 1154835083 ecr 442331786], length 0
08:25:53.918823 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [F.], seq 45, ack 1, win 252, options [nop,nop,TS val 442331786 ecr 1154595794], length 0
08:25:53.918846 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [F.], seq 1, ack 46, win 4096, options [nop,nop,TS val 1154835084 ecr 442331786], length 0
08:25:53.921156 IP 150.101.213.173.https > 10.0.1.3.61016: Flags [.], ack 2, win 252, options [nop,nop,TS val 442331790 ecr 1154835083], length 0
08:25:53.921213 IP 10.0.1.3.61016 > 150.101.213.173.https: Flags [.], ack 46, win 4096, options [nop,nop,TS val 1154835086 ecr 442331790], length 0
08:25:53.923214 IP syd09s01-in-f1.1e100.net.https > 10.0.1.3.61014: Flags [.], ack 2, win 358, options [nop,nop,TS val 44655553 ecr 1154835074], length 0
08:25:54.203258 IP 10.0.1.3.61298 > open.demonii.com.http: UDP, length 16
08:25:54.328997 IP 10.0.1.3.50674 > google-public-dns-a.google.com.domain: 35375+ PTR? 203.237.125.74.in-addr.arpa. (45)
08:25:54.358940 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [P.], seq 4059452535:4059452600, ack 1549807741, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 65
08:25:54.358983 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154835522 ecr 16111189], length 0
08:25:54.360168 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [P.], seq 65:110, ack 1, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 45
08:25:54.360178 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [F.], seq 110, ack 1, win 379, options [nop,nop,TS val 16111189 ecr 1154596222], length 0
08:25:54.360214 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.360232 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.360453 IP 10.0.1.3.61017 > syd10s01-in-f9.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154835523 ecr 16111189], length 0
08:25:54.374780 IP syd10s01-in-f9.1e100.net.https > 10.0.1.3.61017: Flags [.], ack 2, win 379, options [nop,nop,TS val 16111205 ecr 1154835523], length 0
08:25:54.484434 IP google-public-dns-a.google.com.domain > 10.0.1.3.50674: 35375 1/0/0 PTR syd01s19-in-f11.1e100.net. (84)
08:25:54.487645 IP 10.0.1.3.62126 > google-public-dns-a.google.com.domain: 49057+ PTR? 173.213.101.150.in-addr.arpa. (46)
08:25:54.502546 IP google-public-dns-a.google.com.domain > 10.0.1.3.62126: 49057 NXDomain 0/1/0 (112)
08:25:54.546355 IP open.demonii.com > 10.0.1.3: ICMP open.demonii.com udp port http unreachable, length 52
08:25:54.558076 ARP, Request who-has 10.0.1.1 tell 10.0.1.2, length 28
08:25:54.694259 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [P.], seq 3578176056:3578176101, ack 2721719934, win 692, options [nop,nop,TS val 1504542357 ecr 1154596540], length 45
08:25:54.694268 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [F.], seq 45, ack 1, win 692, options [nop,nop,TS val 1504542357 ecr 1154596540], length 0
08:25:54.694311 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [.], ack 45, win 4094, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.694329 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [.], ack 46, win 4094, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.694591 IP 10.0.1.3.60856 > 150.101.213.146.https: Flags [F.], seq 1, ack 46, win 4096, options [nop,nop,TS val 1154835855 ecr 1504542357], length 0
08:25:54.697133 IP 150.101.213.146.https > 10.0.1.3.60856: Flags [.], ack 2, win 692, options [nop,nop,TS val 1504542361 ecr 1154835855], length 0
08:25:55.173844 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [P.], seq 495442182:495442247, ack 2270917817, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 65
08:25:55.173883 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154836332 ecr 2976986874], length 0
08:25:55.175017 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [P.], seq 65:110, ack 1, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 45
08:25:55.175022 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [F.], seq 110, ack 1, win 460, options [nop,nop,TS val 2976986874 ecr 1154596896], length 0
08:25:55.175042 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.175056 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [.], ack 111, win 4096, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.175215 IP 10.0.1.3.61015 > tf-in-f84.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154836333 ecr 2976986874], length 0
08:25:55.331483 IP tf-in-f84.1e100.net.https > 10.0.1.3.61015: Flags [.], ack 2, win 460, options [nop,nop,TS val 2976987191 ecr 1154836333], length 0
08:25:55.468303 IP syd10s01-in-f1.1e100.net.http > 10.0.1.3.60993: Flags [F.], seq 3517182528, ack 29177228, win 350, options [nop,nop,TS val 16112681 ecr 1154597311], length 0
08:25:55.468380 IP 10.0.1.3.60993 > syd10s01-in-f1.1e100.net.http: Flags [.], ack 1, win 4096, options [nop,nop,TS val 1154836625 ecr 16112681], length 0
08:25:55.509102 IP 10.0.1.3.50910 > google-public-dns-a.google.com.domain: 2360+ PTR? 84.72.194.173.in-addr.arpa. (44)
çx08:25:55.548703 IP 10.0.1.3.65269 > google-public-dns-a.google.com.domain: 44511+ PTR? 1.1.0.10.in-addr.arpa. (39)
08:25:55.563948 IP google-public-dns-a.google.com.domain > 10.0.1.3.65269: 44511 NXDomain 0/0/0 (39)
08:25:55.566730 IP 10.0.1.3.64311 > google-public-dns-a.google.com.domain: 38286+ PTR? 2.1.0.10.in-addr.arpa. (39)
08:25:55.581946 IP google-public-dns-a.google.com.domain > 10.0.1.3.64311: 38286 NXDomain 0/0/0 (39)
08:25:55.672625 IP google-public-dns-a.google.com.domain > 10.0.1.3.50910: 2360 1/0/0 PTR tf-in-f84.1e100.net. (77)
08:25:55.801812 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [P.], seq 3919794084:3919794149, ack 2824900822, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 65
08:25:55.801860 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 65, win 4093, options [nop,nop,TS val 1154836956 ecr 44654261], length 0
08:25:55.803006 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [P.], seq 65:110, ack 1, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 45
08:25:55.803015 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [F.], seq 110, ack 1, win 659, options [nop,nop,TS val 44654261 ecr 1154597637], length 0
08:25:55.803050 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 110, win 4094, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.803074 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [.], ack 111, win 4094, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.803287 IP 10.0.1.3.60996 > syd09s01-in-f9.1e100.net.https: Flags [F.], seq 1, ack 111, win 4096, options [nop,nop,TS val 1154836957 ecr 44654261], length 0
08:25:55.818196 IP syd09s01-in-f9.1e100.net.https > 10.0.1.3.60996: Flags [.], ack 2, win 659, options [nop,nop,TS val 44654277 ecr 1154836957], length 0
08:25:57.036948 IP 10.0.1.3.57299 > 10.0.1.255.32412: UDP, length 21
08:25:57.037164 IP 10.0.1.3.55644 > 10.0.1.255.32414: UDP, length 21
c c08:25:59.524261 IP 10.0.1.3.61002 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44634794], length 0
08:25:59.524400 IP 10.0.1.3.60993 > syd10s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 16112681], length 0
08:25:59.524426 IP 10.0.1.3.60992 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4099, options [nop,nop,TS val 1154840674 ecr 44649799], length 0
08:25:59.524451 IP 10.0.1.3.60994 > 74.125.203.95.http: Flags [F.], seq 1, ack 1, win 4115, options [nop,nop,TS val 1154840674 ecr 2743181629], length 0
08:25:59.524478 IP 10.0.1.3.61010 > syd10s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 16113193], length 0
08:25:59.524500 IP 10.0.1.3.61008 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4104, options [nop,nop,TS val 1154840674 ecr 44634734], length 0
08:25:59.524517 IP 10.0.1.3.61009 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44600632], length 0
08:25:59.524533 IP 10.0.1.3.61006 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44600702], length 0
08:25:59.524553 IP 10.0.1.3.61007 > 64.233.187.132.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 2899756312], length 0
08:25:59.524572 IP 10.0.1.3.61005 > 64.233.187.132.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 3027886443], length 0
08:25:59.524591 IP 10.0.1.3.61004 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44614709], length 0
08:25:59.524608 IP 10.0.1.3.61003 > syd09s01-in-f1.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44404799], length 0
08:25:59.524633 IP 10.0.1.3.61011 > syd01s19-in-f11.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 900328418], length 0
08:25:59.524656 IP 10.0.1.3.60999 > syd09s01-in-f9.1e100.net.http: Flags [F.], seq 1, ack 1, win 4096, options [nop,nop,TS val 1154840674 ecr 44616266], length 0
08:25:59.539705 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61002: Flags [R], seq 615629399, win 0, length 0
08:25:59.540965 IP syd10s01-in-f1.1e100.net.http > 10.0.1.3.60993: Flags [R], seq 3517182529, win 0, length 0
08:25:59.540975 IP syd10s01-in-f9.1e100.net.http > 10.0.1.3.61010: Flags [R], seq 112039280, win 0, length 0
08:25:59.540982 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61003: Flags [R], seq 170339387, win 0, length 0
08:25:59.540988 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61009: Flags [R], seq 2260415584, win 0, length 0
08:25:59.542363 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.61008: Flags [R], seq 3071774316, win 0, length 0
08:25:59.542375 IP syd01s19-in-f11.1e100.net.http > 10.0.1.3.61011: Flags [R], seq 2629251844, win 0, length 0
08:25:59.542382 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61004: Flags [R], seq 2793476742, win 0, length 0
08:25:59.542390 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.61006: Flags [R], seq 4218730305, win 0, length 0
08:25:59.542396 IP syd09s01-in-f1.1e100.net.http > 10.0.1.3.60992: Flags [R], seq 927630037, win 0, length 0
08:25:59.542403 IP syd09s01-in-f9.1e100.net.http > 10.0.1.3.60999: Flags [R], seq 2141150611, win 0, length 0
08:25:59.675825 IP 74.125.203.95.http > 10.0.1.3.60994: Flags [.], ack 2, win 341, options [nop,nop,TS val 2743189035 ecr 1154840674], length 0
08:25:59.677735 IP 64.233.187.132.http > 10.0.1.3.61005: Flags [.], ack 2, win 341, options [nop,nop,TS val 3027892335 ecr 1154840674], length 0
08:25:59.679185 IP 64.233.187.132.http > 10.0.1.3.61007: Flags [.], ack 2, win 341, options [nop,nop,TS val 2899762758 ecr 1154840674], length 0

Many thanks

from lgcommander.

ypid avatar ypid commented on July 3, 2024

Is there maybe a application for mac which can control this TV? In this case a tcpdump from your mac would be sufficient, but for now, this does not help much. I am sorry. It only shows that you are trying to connect to your TV and it responds with a TCP reset:

 08:25:41.273712 IP 10.0.1.3.61294 > 10.0.1.6.http-alt: Flags [S], seq 557352297, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 1154822471 ecr 0,sackOK,eol], length 0
 08:25:41.284833 IP 10.0.1.6.http-alt > 10.0.1.3.61294: Flags [R.], seq 0, ack 557352298, win 0, length 0

You could also setup a VPN for the Android and then run tcpdump on the VPN end point. Unfortunately, I don’t know an easy solution to this … Maybe your Access Point is able to capture the traffic. FritzBox APs are known for this feature. Or maybe you can setup a adhoc network with your mac and connect with your Android to it? I don’t really know mac, but this could actually work …

from lgcommander.

Related Issues (11)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.