We limit all the streaming traffic within North America servers except for camera registration, which we intend to fix it in the next release. Do you remember what you were using in the app that could cause connecting to foreign IPs?
I haven’t done anything except set it up per the camera’s instructions. My network is pretty locked down, so if it is not supposed to be attempting outbound to the address I noted, I too would be interested in knowing what is going on. I actually received two more cameras today, so I can let you know if the same issue occurs.
That’s weird as I also track all connectivity attempts from/to any devices in my networks and I’ve only seen wyze connect to domestic/us aws nodes with an occasional hit to ones in Canada. The only other anomaly was actually today when one of the cams attempted to access an isp connection point in Miami which did not come back as aws so I blocked it when I got the alert. I’ve never had any of the 4 wyze cams I’m running try to connect to China (but every single one of my 24 dahau and hikvision ip cams immediately try multiple ports at multiple ip’s all in China as soon as they power up)
I ran my camera on a separate wireless network which is connected through a PC with two NICs and logged the connections from the camera for a short period of time. The following are all the servers that it connected to.
DestinationAddress DestinationPort Connections WhoisOrganization
188.8.131.52 123 4 National Institute of Standards and Technology (NIST)
184.108.40.206 443 6 Amazon Technologies Inc. (AT-88-Z)
220.127.116.11 8443 6 Amazon Technologies Inc. (AT-88-Z)
18.104.22.168 8443 2 Amazon Technologies Inc. (AT-88-Z)
22.214.171.124 8443 4 Amazon Technologies Inc. (AT-88-Z)
126.96.36.199 8883 2 Amazon Technologies Inc. (AT-88-Z)
188.8.131.52 10001 4 OVH Hosting, Inc. (HO-2)
184.108.40.206 10001 4 Leaseweb USA, Inc. (LU)
220.127.116.11 10001 4 Nobis Technology Group, LLC (NTGL)
18.104.22.168 10240 4 Beijing Jingdong 360 Degree E-commerce Co., Ltd.
22.214.171.124 10240 4 FDCservers.net (FDCSE)
126.96.36.199 10240 4 FDCservers.net (FDCSE)
I’m running the latest firmware which is 188.8.131.52. The camera is a WYZE Cam v2.
Someone from WYZE, please explain what these servers are. In particular, I would like to know what the Chinese server is being used for, but, also the other non-Amazon servers. What are ports 10001 and 10240 used for?
Note, the Android app connects to the same Chinese server that the camera does.
@b1c22f43f5f7e1b761a2 It is called Scrutinizer and even the free version is very powerful.
But to feed it with network traffic data you have to have a Netflow capable device on your network, like a router, firewall or Layer 3 switch.
I sure wish some info on this was posted by Wyze, Mine were connecting to Russia on 10001, not anymore (Blocked) but I will admit without more info on WHY this may be the last round of Wyze hardware purchases
We used ThroughTek (TUTK) as our P2P connection provider. They are Taiwan based and have servers worldwide including North America, Europe, Asia and China. The IPs above are their server IP worldwide. The network traffic happens during device boot time and in low frequency I assume. This is because the camera needs to initialize itself during boot time + refresh itself with the servers. I am not talking too much detail here to protect their IP. We have integrated their new API to limit camera traffic to US only starting v2 184.108.40.206 version, If you upgrade to the latest version, you will not see oversea traffic. Please let me know if you see extra oversea traffic in 220.127.116.11 or later. Thanks!
Thanks much! I had blocked the port. Then after reading the thread you linked me to I tested live streaming and it did not work. I unblocked the port and it still didn’t work. I restarted my cameras and now I can live stream again.
For the record, my cameras are on a different WiFi vlan & SSID than my Android device.