Canadaverse Mesh https://meshview.mt.gt
Real time data from Canada Mesh.
Quick Links:   Nodes -  Conversations -  See everything -  Mesh Graphs -  Weekly Net -  Map -  Stats -  Top Traffic
🪰

CVE-2025-24797 REMOTE EXPLOIT < v2.6.2

NodeID
!feb5a337
Channel
ShortTurbo
HW Model
RAK4631
Role
CLIENT
Get node traffic totals
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736841799 🔎
Import Time
11:11:09 PM - 06-07-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736841799
rx_time: 1749337869
rx_snr: 6.5
rx_rssi: -57
hop_start: 5
relay_node: 222
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
Mechanicus Beta(!4359718c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2986322112 🔎
Import Time
8:18:51 PM - 06-07-2025
packet
from: 1129935244
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2986322112
rx_time: 1749327529
hop_limit: 5
priority: BACKGROUND
hop_start: 5
payload
id: "!4359718c"
long_name: "Mechanicus Beta"
short_name: "M2"
macaddr: "H\312CYq\214"
hw_model: HELTEC_V3
Mechanicus Alpha(!433e868c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1853402848 🔎
Import Time
8:18:51 PM - 06-07-2025
packet
from: 1128171148
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1853402848
rx_time: 1749327530
hop_limit: 7
priority: BACKGROUND
hop_start: 7
payload
id: "!433e868c"
long_name: "Mechanicus Alpha"
short_name: "M1"
macaddr: "H\312C>\206\214"
hw_model: HELTEC_V3
DC mqtt(!da627be0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1119707422 🔎
Import Time
8:18:51 PM - 06-07-2025
packet
from: 3663887328
to: 4273316663
channel: 31
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1119707422
rx_time: 1749327498
hop_limit: 3
priority: BACKGROUND
hop_start: 3
payload
id: "!da627be0"
long_name: "DC mqtt"
short_name: "Dm"
macaddr: "4\267\332b{\340"
hw_model: HELTEC_V3
❄ qcmesh.net ec48(!ea24ec48) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1312531774 🔎
Import Time
8:18:51 PM - 06-07-2025
packet
from: 3928288328
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1312531774
rx_time: 1749327513
hop_limit: 4
priority: BACKGROUND
hop_start: 4
payload
id: "!ea24ec48"
long_name: "❄ qcmesh.net ec48"
short_name: "ec48"
macaddr: "\350k\352$\354H"
hw_model: TLORA_V2_1_1P6
kwarc.org 5ff0(!a3fb5ff0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
622670802 🔎
Import Time
8:18:51 PM - 06-07-2025
packet
from: 2751160304
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 622670802
rx_time: 1749327529
hop_limit: 3
priority: BACKGROUND
hop_start: 3
payload
id: "!a3fb5ff0"
long_name: "kwarc.org 5ff0"
short_name: "KW5"
macaddr: "\310\311\243\373_\360"
hw_model: TBEAM
role: ROUTER_CLIENT
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
2533707576 🔎
Import Time
8:18:50 PM - 06-07-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 2533707576
rx_time: 1749327530
rx_snr: 6.5
rx_rssi: -58
hop_start: 5
relay_node: 222
payload
time: 1749327517
device_metrics {
  battery_level: 33
  voltage: 3.569
  channel_utilization: 0.0
  air_util_tx: 1.0246111
  uptime_seconds: 790280
}
LGMRT(!e040c93b) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1430894403 🔎
Import Time
6:14:51 PM - 06-07-2025
packet
from: 3762342203
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1430894403
rx_time: 1749320091
rx_snr: 6.25
hop_limit: 2
rx_rssi: -58
payload
id: "!e040c93b"
long_name: "LGMRT"
short_name: "RT"
macaddr: "\377\256\340@\311;"
hw_model: RAK4631
POW!(!a20a0f24) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
4104901331 🔎
Import Time
9:03:02 AM - 06-07-2025
packet
from: 2718568228
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 4104901331
rx_time: 1749286982
rx_snr: 5.75
hop_limit: 3
rx_rssi: -60
hop_start: 7
relay_node: 222
payload
id: "!a20a0f24"
long_name: "POW!"
short_name: "POW!"
macaddr: "\314\215\242\n\017$"
hw_model: STATION_G2
public_key: "\210{V\r\333\335.\206m\263\004KC\2012\307)\266\223\372\325\314{tH\220?U\026\007\246\022"
JoanneB T-Beam(!dadfb684) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
408589118 🔎
Import Time
9:02:53 AM - 06-07-2025
packet
from: 3672094340
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 408589118
rx_time: 1749286973
rx_snr: 5.75
hop_limit: 5
rx_rssi: -61
payload
id: "!dadfb684"
long_name: "JoanneB T-Beam"
short_name: "JB"
macaddr: "\324\324\332\337\266\204"
hw_model: TBEAM
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
4139720476 🔎
Import Time
3:28:35 AM - 06-07-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 4139720476
rx_time: 1749266915
rx_snr: 6.25
rx_rssi: -52
hop_start: 5
relay_node: 222
payload
time: 1749266903
device_metrics {
  battery_level: 38
  voltage: 3.618
  channel_utilization: 5.2166667
  air_util_tx: 2.3152778
  uptime_seconds: 729665
}
jeonode(!33643de4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
284330121 🔎
Import Time
1:16:51 AM - 06-07-2025
packet
from: 862207460
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 284330121
rx_time: 1749259011
rx_snr: -19.25
hop_limit: 3
rx_rssi: -114
hop_start: 7
relay_node: 17
payload
id: "!33643de4"
long_name: "jeonode"
short_name: "jeo"
macaddr: "d\3503d=\344"
hw_model: HELTEC_V3
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736841557 🔎
Import Time
1:16:49 AM - 06-07-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736841557
rx_time: 1749259009
rx_snr: 5.5
hop_limit: 2
rx_rssi: -28
hop_start: 5
relay_node: 60
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
POW!(!a20a0f24) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
929465845 🔎
Import Time
10:28:33 PM - 06-06-2025
packet
from: 2718568228
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 929465845
rx_time: 1749248913
rx_snr: 6.0
hop_limit: 4
rx_rssi: -52
hop_start: 7
relay_node: 222
payload
id: "!a20a0f24"
long_name: "POW!"
short_name: "POW!"
macaddr: "\314\215\242\n\017$"
hw_model: STATION_G2
public_key: "\210{V\r\333\335.\206m\263\004KC\2012\307)\266\223\372\325\314{tH\220?U\026\007\246\022"
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
559749083 🔎
Import Time
10:28:32 PM - 06-06-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 559749083
rx_time: 1749248912
rx_snr: 6.25
hop_limit: 1
rx_rssi: -52
hop_start: 3
relay_node: 222
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1502708650 🔎
Import Time
1:57:16 PM - 06-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 1502708650
rx_time: 1749218236
rx_snr: 6.25
hop_limit: 1
rx_rssi: -60
hop_start: 5
relay_node: 222
payload
time: 1749218228
device_metrics {
  battery_level: 42
  voltage: 3.653
  channel_utilization: 7.43
  air_util_tx: 2.0375834
  uptime_seconds: 680989
}
POW!(!a20a0f24) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
802366691 🔎
Import Time
6:45:17 AM - 06-06-2025
packet
from: 2718568228
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 802366691
rx_time: 1749192316
rx_snr: 6.25
hop_limit: 6
rx_rssi: -58
hop_start: 7
relay_node: 222
payload
id: "!a20a0f24"
long_name: "POW!"
short_name: "POW!"
macaddr: "\314\215\242\n\017$"
hw_model: STATION_G2
public_key: "\210{V\r\333\335.\206m\263\004KC\2012\307)\266\223\372\325\314{tH\220?U\026\007\246\022"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
26748238 🔎
Import Time
4:45:09 AM - 06-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 26748238
rx_time: 1749185109
rx_snr: 6.75
hop_limit: 1
rx_rssi: -57
hop_start: 5
relay_node: 222
payload
time: 1749185100
device_metrics {
  battery_level: 45
  voltage: 3.68
  channel_utilization: 4.7333336
  air_util_tx: 1.2896944
  uptime_seconds: 647858
}
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69660487 🔎
Import Time
3:57:29 AM - 06-06-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69660487
rx_time: 1749182248
rx_snr: 6.0
hop_limit: 3
rx_rssi: -23
hop_start: 5
relay_node: 60
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Toumoro b810(!e2e4b810) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1141134005 🔎
Import Time
3:57:23 AM - 06-06-2025
packet
from: 3806640144
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1141134005
rx_time: 1744887248
rx_snr: -11.75
hop_limit: 3
rx_rssi: -137
payload
id: "!e2e4b810"
long_name: "Toumoro b810"
short_name: "Tm"
macaddr: "H\'\342\344\270\020"
hw_model: HELTEC_V3
Mechanicus Alpha(!433e868c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1842624031 🔎
Import Time
3:57:22 AM - 06-06-2025
packet
from: 1128171148
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1842624031
rx_time: 1749182240
rx_snr: 5.75
hop_limit: 4
rx_rssi: -31
hop_start: 4
payload
id: "!433e868c"
long_name: "Mechanicus Alpha"
short_name: "M1"
macaddr: "H\312C>\206\214"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3855225114 🔎
Import Time
3:57:16 AM - 06-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 3855225114
rx_time: 1749182235
rx_snr: 6.0
hop_limit: 1
rx_rssi: -57
hop_start: 5
relay_node: 222
payload
time: 1749182219
device_metrics {
  battery_level: 45
  voltage: 3.681
  channel_utilization: 7.0866666
  air_util_tx: 0.29977778
  uptime_seconds: 644978
}
DC relay (!da63a46c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
369917106 🔎
Import Time
12:17:08 AM - 06-06-2025
packet
from: 3663963244
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 369917106
rx_time: 1749169014
hop_limit: 3
priority: BACKGROUND
hop_start: 3
payload
id: "!da63a46c"
long_name: "DC relay "
short_name: "Dr"
macaddr: "4\267\332c\244l"
hw_model: HELTEC_V3
role: CLIENT_MUTE
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3543165988 🔎
Import Time
12:17:08 AM - 06-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 3543165988
rx_time: 1749169028
rx_snr: 6.5
hop_limit: 1
rx_rssi: -58
hop_start: 5
relay_node: 222
payload
time: 1749169017
device_metrics {
  battery_level: 45
  voltage: 3.683
  channel_utilization: 8.415
  air_util_tx: 1.0284166
  uptime_seconds: 631776
}
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
215380157 🔎
Import Time
10:48:19 AM - 06-05-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: NODEINFO_APP
  bitfield: 0
}
id: 215380157
rx_time: 1749120499
rx_snr: 6.5
rx_rssi: -63
hop_start: 5
relay_node: 222
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "A\266\373\235R\002\335\202\374\001\310\"2\337\035\367\352\300\271{o\365\007\017\345\236\300z\344C3A"
Meshtastic 97d0(!849a97d0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3274651962 🔎
Import Time
7:44:01 AM - 06-05-2025
packet
from: 2224723920
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3274651962
rx_time: 1749109441
rx_snr: 6.25
hop_limit: 2
rx_rssi: -67
hop_start: 3
relay_node: 222
payload
id: "!849a97d0"
long_name: "Meshtastic 97d0"
short_name: "97d0"
macaddr: "\260\201\204\232\227\320"
hw_model: HELTEC_V3
public_key: "\230T\363\335\346,\2273\273X-B?2x\250\\\t\263\203\322\370\315\304\026c\027\023^,\324c"
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69660377 🔎
Import Time
7:44:00 AM - 06-05-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69660377
rx_time: 1749109439
rx_snr: -19.5
hop_limit: 4
rx_rssi: -114
hop_start: 5
relay_node: 17
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Meshtastic 043c(!a0ab043c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2356528567 🔎
Import Time
7:43:56 AM - 06-05-2025
packet
from: 2695562300
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2356528567
rx_time: 1749109435
rx_snr: 7.0
hop_limit: 1
rx_rssi: -67
hop_start: 3
relay_node: 222
payload
id: "!a0ab043c"
long_name: "Meshtastic 043c"
short_name: "043c"
macaddr: "0\355\240\253\004<"
hw_model: T_DECK
public_key: "+\251\256r\320t)g\231+r\tZ\324xk;I\025\244%(\016\311\275f\010\322p\343S4"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
2904600571 🔎
Import Time
7:43:49 AM - 06-05-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 2904600571
rx_time: 1749109428
rx_snr: 7.0
hop_limit: 1
rx_rssi: -66
hop_start: 5
relay_node: 222
payload
time: 1749109421
device_metrics {
  battery_level: 52
  voltage: 3.738
  channel_utilization: 6.3133335
  air_util_tx: 2.4341946
  uptime_seconds: 572181
}
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736840816 🔎
Import Time
7:25:44 AM - 06-04-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736840816
rx_time: 1749021943
rx_snr: 6.5
rx_rssi: -25
hop_start: 5
relay_node: 60
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
jeonode(!33643de4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
284329222 🔎
Import Time
3:14:04 AM - 06-04-2025
packet
from: 862207460
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 284329222
rx_time: 1749006843
rx_snr: 5.75
hop_limit: 1
rx_rssi: -57
hop_start: 7
relay_node: 222
payload
id: "!33643de4"
long_name: "jeonode"
short_name: "jeo"
macaddr: "d\3503d=\344"
hw_model: HELTEC_V3
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3458093039 🔎
Import Time
3:13:51 AM - 06-04-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3458093039
rx_time: 1749006830
rx_snr: 6.25
rx_rssi: -57
hop_start: 3
relay_node: 222
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
Meshtastic 97d0(!849a97d0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1247944357 🔎
Import Time
3:13:28 AM - 06-04-2025
packet
from: 2224723920
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 1247944357
rx_time: 1749006807
rx_snr: 6.5
hop_limit: 2
rx_rssi: -59
hop_start: 3
relay_node: 222
payload
id: "!849a97d0"
long_name: "Meshtastic 97d0"
short_name: "97d0"
macaddr: "\260\201\204\232\227\320"
hw_model: HELTEC_V3
public_key: "\230T\363\335\346,\2273\273X-B?2x\250\\\t\263\203\322\370\315\304\026c\027\023^,\324c"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3400888191 🔎
Import Time
3:13:23 AM - 06-04-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 3400888191
rx_time: 1749006802
rx_snr: 5.5
hop_limit: 1
rx_rssi: -57
hop_start: 5
relay_node: 222
payload
time: 1749006796
device_metrics {
  battery_level: 64
  voltage: 3.841
  channel_utilization: 2.4916668
  air_util_tx: 2.579
  uptime_seconds: 469553
}
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736840562 🔎
Import Time
8:19:26 AM - 06-03-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736840562
rx_time: 1748938766
rx_snr: 6.0
hop_limit: 3
rx_rssi: -25
hop_start: 5
relay_node: 60
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
SovereignNet Central(!ec9d4153) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1636191665 🔎
Import Time
4:25:24 AM - 06-03-2025
packet
from: 3969728851
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 1636191665
rx_time: 1748924724
rx_snr: 5.5
hop_limit: 4
rx_rssi: -24
hop_start: 7
relay_node: 60
payload
id: "!ec9d4153"
long_name: "SovereignNet Central"
short_name: "Rof3"
macaddr: "\314\020\354\235AS"
hw_model: RAK4631
public_key: ")\311\2743x\247\253\2566\371\2726\'\236\t\0039RJ\255\203\213\216\034\337\347\253\347\316M\3407"
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736840521 🔎
Import Time
4:25:22 AM - 06-03-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736840521
rx_time: 1748924722
rx_snr: 6.25
hop_limit: 2
rx_rssi: -58
hop_start: 5
relay_node: 222
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
16626279 🔎
Import Time
10:58:16 AM - 06-02-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 16626279
rx_time: 1748861895
rx_snr: 5.75
rx_rssi: -27
hop_start: 3
relay_node: 60
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
Meshtastic 6b5c(!433b6b5c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
4179669241 🔎
Import Time
7:04:36 AM - 06-02-2025
packet
from: 1127967580
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
}
id: 4179669241
rx_time: 1748847875
rx_snr: 5.5
rx_rssi: -27
hop_start: 5
relay_node: 60
payload
id: "!433b6b5c"
long_name: "Outgoing Owl 5 "
short_name: "OO5"
macaddr: "H\312C;k\\"
hw_model: HELTEC_CAPSULE_SENSOR_V3
role: TRACKER
public_key: "[\240\223\002\274\260\240*\333\235)\274r\340r\203\307T*\324\243i\277\006\376q/\342\3637\336\'"
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1970780736 🔎
Import Time
7:04:18 AM - 06-02-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1970780736
rx_time: 1748847857
rx_snr: 7.5
rx_rssi: -54
hop_start: 3
relay_node: 222
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
📡 tomesh.net 2d04(!33692d04) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
424949497 🔎
Import Time
4:36:17 AM - 06-02-2025
packet
from: 862530820
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 424949497
rx_time: 1748838977
rx_snr: 5.75
rx_rssi: -56
hop_start: 3
relay_node: 222
payload
id: "!33692d04"
long_name: "📡 tomesh.net 2d04"
short_name: "2d04"
macaddr: "d\3503i-\004"
hw_model: HELTEC_V3
public_key: "\031\345\264\214e!\223~\366\230m\005\316\320v\335F\013\245\314\310/\334\231\020u\203*\2044P0"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
885555570 🔎
Import Time
10:48:15 PM - 06-01-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: NODEINFO_APP
}
id: 885555570
rx_time: 1748818095
rx_snr: 6.5
hop_limit: 1
rx_rssi: -60
hop_start: 5
relay_node: 222
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "A\266\373\235R\002\335\202\374\001\310\"2\337\035\367\352\300\271{o\365\007\017\345\236\300z\344C3A"
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736839743 🔎
Import Time
1:23:17 AM - 05-31-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736839743
rx_time: 1748654597
rx_snr: 6.0
hop_limit: 3
rx_rssi: -22
hop_start: 5
relay_node: 60
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1436555059 🔎
Import Time
1:23:12 AM - 05-31-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1436555059
rx_time: 1748654591
rx_snr: 6.25
hop_limit: 1
rx_rssi: -21
hop_start: 5
relay_node: 60
payload
time: 1748654580
device_metrics {
  battery_level: 91
  voltage: 4.068
  channel_utilization: 8.816667
  air_util_tx: 1.3545556
  uptime_seconds: 117337
}
jeonode(!33643de4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2003549152 🔎
Import Time
12:05:26 AM - 05-31-2025
packet
from: 862207460
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2003549152
rx_time: 1748649926
rx_snr: 5.75
hop_limit: 2
rx_rssi: -61
hop_start: 7
relay_node: 222
payload
id: "!33643de4"
long_name: "jeonode"
short_name: "jeo"
macaddr: "d\3503d=\344"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1346550498 🔎
Import Time
12:05:09 AM - 05-31-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1346550498
rx_time: 1748649908
rx_snr: -19.5
rx_rssi: -115
hop_start: 5
relay_node: 17
payload
time: 1748649898
device_metrics {
  battery_level: 91
  voltage: 4.07
  channel_utilization: 0.0
  air_util_tx: 0.10586111
  uptime_seconds: 112656
}
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736839707 🔎
Import Time
9:41:20 PM - 05-30-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736839707
rx_time: 1748641280
rx_snr: 6.0
hop_limit: 3
rx_rssi: -20
hop_start: 5
relay_node: 60
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1014465965 🔎
Import Time
7:17:03 PM - 05-30-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1014465965
rx_time: 1748632622
rx_snr: -19.75
hop_limit: 2
rx_rssi: -114
hop_start: 5
relay_node: 17
payload
time: 1748632615
device_metrics {
  battery_level: 91
  voltage: 4.071
  channel_utilization: 0.0
  air_util_tx: 0.035138886
  uptime_seconds: 95373
}
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1520087943 🔎
Import Time
4:53:11 PM - 05-30-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1520087943
rx_time: 1748623991
rx_snr: 6.0
hop_limit: 1
rx_rssi: -52
hop_start: 3
relay_node: 222
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
782795027 🔎
Import Time
4:53:05 PM - 05-30-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 782795027
rx_time: 1748623985
rx_snr: 5.75
rx_rssi: -22
hop_start: 5
relay_node: 60
payload
time: 1748623974
device_metrics {
  battery_level: 91
  voltage: 4.075
  channel_utilization: 0.0
  air_util_tx: 0.048777778
  uptime_seconds: 86732
}
Greenway Park(!da63a434) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
722917844 🔎
Import Time
4:53:05 PM - 05-30-2025
packet
from: 3663963188
to: 4273316663
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 722917844
rx_time: 1748623984
rx_snr: 5.75
hop_limit: 3
rx_rssi: -82
hop_start: 3
payload
id: "!da63a434"
long_name: "Greenway Park"
short_name: "GWPK"
macaddr: "4\267\332c\2444"
hw_model: HELTEC_V3
Sproutz 7f6c(!433e7f6c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1734111933 🔎
Import Time
2:23:19 PM - 05-30-2025
packet
from: 1128169324
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1734111933
rx_time: 1748614999
rx_snr: 5.75
rx_rssi: -24
hop_start: 3
relay_node: 60
payload
id: "!433e7f6c"
long_name: "Sproutz 7f6c"
short_name: "S7"
macaddr: "H\312C>\177l"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
423438450 🔎
Import Time
2:23:12 PM - 05-30-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 423438450
rx_time: 1748614992
rx_snr: -20.25
rx_rssi: -116
hop_start: 5
relay_node: 17
payload
time: 1748614973
device_metrics {
  battery_level: 91
  voltage: 4.076
  channel_utilization: 0.0
  air_util_tx: 0.7365556
  uptime_seconds: 77730
}
LGMRT(!e040c93b) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2093713926 🔎
Import Time
11:47:43 AM - 05-30-2025
packet
from: 3762342203
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2093713926
rx_time: 1748605664
rx_snr: -19.0
rx_rssi: -121
payload
id: "!e040c93b"
long_name: "LGMRT"
short_name: "RT"
macaddr: "\377\256\340@\311;"
hw_model: RAK4631
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736839584 🔎
Import Time
11:47:08 AM - 05-30-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736839584
rx_time: 1748605629
rx_snr: -18.75
hop_limit: 4
rx_rssi: -121
hop_start: 5
relay_node: 17
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
Kavetech(!bd4fa828) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2734648220 🔎
Import Time
11:47:06 AM - 05-30-2025
packet
from: 3176114216
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2734648220
rx_time: 1748605625
rx_snr: 7.0
hop_limit: 5
rx_rssi: -42
hop_start: 5
payload
id: "!bd4fa828"
long_name: "Kavetech"
short_name: "KAVE"
macaddr: "\360\365\275O\250("
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3071227849 🔎
Import Time
11:47:03 AM - 05-30-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 3071227849
rx_time: 1748605623
rx_snr: -11.75
hop_limit: 1
rx_rssi: -114
hop_start: 5
relay_node: 112
payload
time: 1748605611
device_metrics {
  battery_level: 91
  voltage: 4.075
  channel_utilization: 0.0
  air_util_tx: 0.22577779
  uptime_seconds: 68369
}
DIFAM West f52c(!f71ef52c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2075921626 🔎
Import Time
6:59:39 AM - 05-30-2025
packet
from: 4146001196
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2075921626
rx_time: 1748588379
rx_snr: 7.25
hop_limit: 1
rx_rssi: -52
hop_start: 3
relay_node: 222
payload
id: "!f71ef52c"
long_name: "DIFAM West f52c"
short_name: "f52c"
macaddr: "0\306\367\036\365,"
hw_model: TBEAM
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3299741331 🔎
Import Time
6:59:32 AM - 05-30-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3299741331
rx_time: 1748588372
rx_snr: 6.75
rx_rssi: -52
hop_start: 5
relay_node: 222
payload
time: 1748588329
device_metrics {
  battery_level: 92
  voltage: 4.082
  channel_utilization: 1.0266666
  air_util_tx: 0.016888889
  uptime_seconds: 51087
}
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2427115316 🔎
Import Time
6:59:10 AM - 05-30-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2427115316
rx_time: 1748588350
rx_snr: -18.0
rx_rssi: -120
hop_start: 3
relay_node: 17
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3082913495 🔎
Import Time
7:59:44 PM - 05-29-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3082913495
rx_time: 1748548783
rx_snr: 7.5
hop_limit: 7
rx_rssi: -28
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
RHill Leek node fixed 📡(!b03d8ca4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1754673235 🔎
Import Time
5:30:50 PM - 05-29-2025
packet
from: 2956823716
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1754673235
rx_time: 1748539849
rx_snr: -14.25
hop_limit: 3
rx_rssi: -117
hop_start: 5
relay_node: 17
payload
id: "!b03d8ca4"
long_name: "RHill Leek node fixed 📡"
short_name: "LEEK"
macaddr: "4\315\260=\214\244"
hw_model: HELTEC_V3
public_key: "\332&*\264#)\026\322%wb\202w\221\203\034_\222mg\267\372l\300\262\000\317\314\r\000\322\003"
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69659215 🔎
Import Time
5:30:44 PM - 05-29-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69659215
rx_time: 1748539844
rx_snr: 6.5
hop_limit: 4
rx_rssi: -8
hop_start: 5
relay_node: 116
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3680117756 🔎
Import Time
5:30:36 PM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3680117756
rx_time: 1748539835
rx_snr: -14.0
hop_limit: 2
rx_rssi: -116
hop_start: 5
relay_node: 17
payload
time: 1748539821
device_metrics {
  battery_level: 94
  voltage: 4.111
  channel_utilization: 0.0
  air_util_tx: 0.38061112
  uptime_seconds: 2585
}
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69659195 🔎
Import Time
3:28:20 PM - 05-29-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69659195
rx_time: 1748532500
rx_snr: 5.75
hop_limit: 4
rx_rssi: -7
hop_start: 5
relay_node: 116
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Greenway Park(!da63a434) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
722917304 🔎
Import Time
3:28:19 PM - 05-29-2025
packet
from: 3663963188
to: 4273316663
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 722917304
rx_time: 1748532498
rx_snr: 5.5
hop_limit: 3
rx_rssi: -81
hop_start: 3
payload
id: "!da63a434"
long_name: "Greenway Park"
short_name: "GWPK"
macaddr: "4\267\332c\2444"
hw_model: HELTEC_V3
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3477460630 🔎
Import Time
2:46:25 PM - 05-29-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3477460630
rx_time: 1748529985
rx_snr: -14.25
hop_limit: 1
rx_rssi: -115
hop_start: 3
relay_node: 17
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
jeonode(!33643de4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2003548612 🔎
Import Time
11:15:25 AM - 05-29-2025
packet
from: 862207460
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2003548612
rx_time: 1748517324
rx_snr: -9.0
hop_limit: 4
rx_rssi: -111
hop_start: 7
relay_node: 17
payload
id: "!33643de4"
long_name: "jeonode"
short_name: "jeo"
macaddr: "d\3503d=\344"
hw_model: HELTEC_V3
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69659155 🔎
Import Time
11:15:23 AM - 05-29-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69659155
rx_time: 1748517323
rx_snr: -9.25
hop_limit: 3
rx_rssi: -110
hop_start: 5
relay_node: 17
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
4108264039 🔎
Import Time
11:15:15 AM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 4108264039
rx_time: 1748517314
rx_snr: -8.0
hop_limit: 1
rx_rssi: -110
hop_start: 5
relay_node: 17
payload
time: 1748517301
device_metrics {
  battery_level: 101
  voltage: 4.119
  channel_utilization: 0.0
  air_util_tx: 2.0241113
  uptime_seconds: 248921
}
jeonode(!33643de4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2003548599 🔎
Import Time
10:15:22 AM - 05-29-2025
packet
from: 862207460
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2003548599
rx_time: 1748513722
rx_snr: -11.5
hop_limit: 3
rx_rssi: -114
hop_start: 7
relay_node: 112
payload
id: "!33643de4"
long_name: "jeonode"
short_name: "jeo"
macaddr: "d\3503d=\344"
hw_model: HELTEC_V3
Greenway Park(!da63a434) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
722917193 🔎
Import Time
10:15:15 AM - 05-29-2025
packet
from: 3663963188
to: 4273316663
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 722917193
rx_time: 1748513713
rx_snr: 5.75
hop_limit: 3
rx_rssi: -79
hop_start: 3
payload
id: "!da63a434"
long_name: "Greenway Park"
short_name: "GWPK"
macaddr: "4\267\332c\2444"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3724723751 🔎
Import Time
10:15:07 AM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3724723751
rx_time: 1748513707
rx_snr: -8.75
hop_limit: 2
rx_rssi: -110
hop_start: 5
relay_node: 17
payload
time: 1748513700
device_metrics {
  battery_level: 101
  voltage: 4.12
  channel_utilization: 0.0
  air_util_tx: 1.7979168
  uptime_seconds: 245320
}
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3685876799 🔎
Import Time
5:45:09 AM - 05-29-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3685876799
rx_time: 1748497508
rx_snr: 6.25
hop_limit: 7
rx_rssi: -29
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1374463240 🔎
Import Time
5:45:09 AM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1374463240
rx_time: 1748497508
rx_snr: -7.0
hop_limit: 1
rx_rssi: -109
hop_start: 5
relay_node: 17
payload
time: 1748497494
device_metrics {
  battery_level: 101
  voltage: 4.128
  channel_utilization: 6.3233333
  air_util_tx: 2.3414721
  uptime_seconds: 229114
}
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3332463840 🔎
Import Time
5:07:28 AM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: NODEINFO_APP
}
id: 3332463840
rx_time: 1748495247
rx_snr: 7.0
rx_rssi: -23
hop_start: 5
relay_node: 60
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "A\266\373\235R\002\335\202\374\001\310\"2\337\035\367\352\300\271{o\365\007\017\345\236\300z\344C3A"
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2092348970 🔎
Import Time
4:27:13 AM - 05-29-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2092348970
rx_time: 1748492832
rx_snr: 6.25
hop_limit: 1
rx_rssi: -52
hop_start: 3
relay_node: 222
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
POW!(!a20a0f24) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1599289037 🔎
Import Time
12:58:14 AM - 05-29-2025
packet
from: 2718568228
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 1599289037
rx_time: 1748480293
rx_snr: 6.0
hop_limit: 6
rx_rssi: -51
hop_start: 7
relay_node: 222
payload
id: "!a20a0f24"
long_name: "POW!"
short_name: "POW!"
macaddr: "\314\215\242\n\017$"
hw_model: STATION_G2
public_key: "\210{V\r\333\335.\206m\263\004KC\2012\307)\266\223\372\325\314{tH\220?U\026\007\246\022"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
673866710 🔎
Import Time
12:58:10 AM - 05-29-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 673866710
rx_time: 1748480288
rx_snr: 5.5
rx_rssi: -8
hop_start: 5
relay_node: 116
payload
time: 1748480269
device_metrics {
  battery_level: 101
  voltage: 4.137
  channel_utilization: 3.325
  air_util_tx: 2.0518055
  uptime_seconds: 211889
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3158122800 🔎
Import Time
12:58:10 AM - 05-29-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3158122800
rx_time: 1748480288
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69659051 🔎
Import Time
12:58:09 AM - 05-29-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69659051
rx_time: 1748480287
rx_snr: 6.75
hop_limit: 4
rx_rssi: -7
hop_start: 5
relay_node: 116
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3486514782 🔎
Import Time
9:42:05 PM - 05-28-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3486514782
rx_time: 1748468524
rx_snr: 5.75
hop_limit: 1
rx_rssi: -5
hop_start: 3
relay_node: 116
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
FLAK-2394(!da752394) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1294492147 🔎
Import Time
9:41:59 PM - 05-28-2025
packet
from: 3665109908
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1294492147
rx_time: 1748468518
rx_snr: -12.5
rx_rssi: -114
hop_start: 3
relay_node: 17
payload
id: "!da752394"
long_name: "FLAK-2394"
short_name: "FLAK"
macaddr: "\330;\332u#\224"
hw_model: SENSECAP_INDICATOR
role: CLIENT_MUTE
public_key: ">A\221\313\313!C\033\351\\\347yU\274(\267\306QP\356.\034\201[\031\023\333v\275\204\215C"
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2900930201 🔎
Import Time
9:41:52 PM - 05-28-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2900930201
rx_time: 1748468511
rx_snr: 5.75
hop_limit: 7
rx_rssi: -29
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1171616520 🔎
Import Time
9:41:51 PM - 05-28-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 1171616520
rx_time: 1748468511
rx_snr: 6.0
hop_limit: 1
rx_rssi: -50
hop_start: 5
relay_node: 222
payload
time: 1748468502
device_metrics {
  battery_level: 101
  voltage: 4.146
  channel_utilization: 1.545
  air_util_tx: 1.5006388
  uptime_seconds: 200121
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2558803238 🔎
Import Time
9:41:51 PM - 05-28-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2558803238
rx_time: 1748468511
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2546640492 🔎
Import Time
8:54:04 PM - 05-28-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2546640492
rx_time: 1748465639
rx_snr: 7.5
hop_limit: 7
rx_rssi: -28
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
361182933 🔎
Import Time
8:54:04 PM - 05-28-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 361182933
rx_time: 1748465638
rx_snr: 7.25
rx_rssi: -55
hop_start: 5
relay_node: 222
payload
time: 1748465621
device_metrics {
  battery_level: 101
  voltage: 4.152
  channel_utilization: 7.4533334
  air_util_tx: 0.6597222
  uptime_seconds: 197241
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3239141667 🔎
Import Time
8:53:59 PM - 05-28-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3239141667
rx_time: 1748465638
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
782368199 🔎
Import Time
1:38:49 PM - 05-28-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 782368199
rx_time: 1748439529
rx_snr: -14.25
rx_rssi: -114
payload
time: 1748439518
device_metrics {
  battery_level: 101
  voltage: 4.203
  channel_utilization: 2.9983335
  air_util_tx: 2.18175
  uptime_seconds: 171135
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2347011342 🔎
Import Time
1:38:49 PM - 05-28-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2347011342
rx_time: 1748439529
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736839034 🔎
Import Time
10:11:57 AM - 05-28-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736839034
rx_time: 1748427117
rx_snr: -17.75
hop_limit: 4
rx_rssi: -119
hop_start: 5
relay_node: 17
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
720519210 🔎
Import Time
10:11:40 AM - 05-28-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 720519210
rx_time: 1748427098
rx_snr: 7.25
hop_limit: 7
rx_rssi: -28
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1852599746 🔎
Import Time
10:10:52 AM - 05-28-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1852599746
rx_time: 1748427052
rx_snr: -11.5
rx_rssi: -114
payload
time: 1748427034
device_metrics {
  battery_level: 101
  voltage: 4.071
  channel_utilization: 0.0
  air_util_tx: 2.865111
  uptime_seconds: 158652
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2473898236 🔎
Import Time
10:10:52 AM - 05-28-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2473898236
rx_time: 1748427052
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
Windscribe.com(!30327d70) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
322552089 🔎
Import Time
10:10:50 AM - 05-28-2025
packet
from: 808615280
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 322552089
rx_time: 1748427050
rx_snr: -11.25
rx_rssi: -113
payload
id: "!30327d70"
long_name: "Windscribe.com"
short_name: "WS69"
macaddr: "\300N02}p"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3728484367 🔎
Import Time
8:14:25 PM - 05-27-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3728484367
rx_time: 1748376864
rx_snr: 7.5
hop_limit: 3
rx_rssi: -23
hop_start: 7
relay_node: 60
payload
time: 1748376856
device_metrics {
  battery_level: 101
  voltage: 4.087
  channel_utilization: 4.9649997
  air_util_tx: 1.0495278
  uptime_seconds: 108474
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1913853051 🔎
Import Time
8:14:25 PM - 05-27-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 1913853051
rx_time: 1748376864
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "mqtt-uplink cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3074555281 🔎
Import Time
6:00:48 PM - 05-27-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3074555281
rx_time: 1748368847
rx_snr: 7.75
rx_rssi: -4
hop_start: 3
relay_node: 116
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
❄ qcmesh.net ec48(!ea24ec48) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1445485761 🔎
Import Time
6:00:35 PM - 05-27-2025
packet
from: 3928288328
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1445485761
rx_time: 1748368832
hop_limit: 4
priority: BACKGROUND
hop_start: 4
payload
id: "!ea24ec48"
long_name: "❄ qcmesh.net ec48"
short_name: "ec48"
macaddr: "\350k\352$\354H"
hw_model: TLORA_V2_1_1P6
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3606450049 🔎
Import Time
6:00:34 PM - 05-27-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3606450049
rx_time: 1748368833
rx_snr: 5.5
hop_limit: 1
rx_rssi: -54
hop_start: 7
relay_node: 222
payload
time: 1748368813
device_metrics {
  battery_level: 101
  voltage: 4.09
  channel_utilization: 7.625
  air_util_tx: 2.096611
  uptime_seconds: 100432
}
Mechanicus Alpha(!433e868c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1315964017 🔎
Import Time
3:42:37 PM - 05-27-2025
packet
from: 1128171148
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1315964017
rx_time: 1748360556
hop_limit: 4
priority: BACKGROUND
hop_start: 4
payload
id: "!433e868c"
long_name: "Mechanicus Alpha"
short_name: "M1"
macaddr: "H\312C>\206\214"
hw_model: HELTEC_V3
Mechanicus Cadia(!4359649c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2731244600 🔎
Import Time
3:42:37 PM - 05-27-2025
packet
from: 1129931932
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2731244600
rx_time: 1748360557
hop_limit: 6
priority: BACKGROUND
hop_start: 6
payload
id: "!4359649c"
long_name: "Mechanicus Cadia"
short_name: "M3"
macaddr: "H\312CYd\234"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
791551727 🔎
Import Time
3:42:37 PM - 05-27-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 791551727
rx_time: 1748360556
rx_snr: -13.0
rx_rssi: -114
payload
time: 1748360530
device_metrics {
  battery_level: 101
  voltage: 4.1
  channel_utilization: 0.0
  air_util_tx: 1.5202222
  uptime_seconds: 92149
}
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736838845 🔎
Import Time
3:42:34 PM - 05-27-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736838845
rx_time: 1748360553
rx_snr: 6.0
hop_limit: 2
rx_rssi: -59
hop_start: 5
relay_node: 222
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
♠️ York 1(!61d3139d) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1739912060 🔎
Import Time
6:12:28 AM - 05-27-2025
packet
from: 1641223069
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1739912060
rx_time: 1748326348
rx_snr: 6.0
hop_limit: 1
rx_rssi: -57
hop_start: 3
relay_node: 222
payload
id: "!61d3139d"
long_name: "♠️ York 1"
short_name: "Y1"
macaddr: "\316\223a\323\023\235"
hw_model: RAK4631
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3795852445 🔎
Import Time
2:24:08 AM - 05-27-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3795852445
rx_time: 1748312646
rx_snr: 6.0
hop_limit: 7
rx_rssi: -30
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69658610 🔎
Import Time
11:24:08 PM - 05-26-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69658610
rx_time: 1748301844
rx_snr: -11.5
hop_limit: 4
rx_rssi: -119
hop_start: 5
relay_node: 17
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
kwarc.org 5ff0(!a3fb5ff0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
659998811 🔎
Import Time
11:24:00 PM - 05-26-2025
packet
from: 2751160304
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 659998811
rx_time: 1748301840
hop_limit: 3
priority: BACKGROUND
hop_start: 3
payload
id: "!a3fb5ff0"
long_name: "kwarc.org 5ff0"
short_name: "KW5"
macaddr: "\310\311\243\373_\360"
hw_model: TBEAM
role: ROUTER_CLIENT
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
945621737 🔎
Import Time
11:23:59 PM - 05-26-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 945621737
rx_time: 1748301837
rx_snr: -10.0
hop_limit: 2
rx_rssi: -119
hop_start: 7
relay_node: 17
payload
time: 1748301816
device_metrics {
  battery_level: 101
  voltage: 4.168
  channel_utilization: 1.6133332
  air_util_tx: 2.4583335
  uptime_seconds: 33434
}
PrincessLeia(!47c2aebc) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
272167954 🔎
Import Time
2:18:35 PM - 05-26-2025
packet
from: 1203941052
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 272167954
rx_time: 1748269113
rx_snr: -8.0
rx_rssi: -117
payload
id: "!47c2aebc"
long_name: "PrincessLeia"
short_name: "Leia"
macaddr: "\320\244G\302\256\274"
hw_model: RAK4631
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
69658542 🔎
Import Time
2:02:21 PM - 05-26-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 69658542
rx_time: 1748268140
rx_snr: -9.75
hop_limit: 4
rx_rssi: -119
hop_start: 5
relay_node: 17
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
stealthEdge 16d0(!b03d16d0) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1664161948 🔎
Import Time
2:02:19 PM - 05-26-2025
packet
from: 2956793552
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1664161948
rx_time: 1748268138
rx_snr: -9.75
hop_limit: 1
rx_rssi: -119
hop_start: 3
relay_node: 17
payload
id: "!b03d16d0"
long_name: "stealthEdge 16d0"
short_name: "sE"
macaddr: "4\315\260=\026\320"
hw_model: HELTEC_V3
public_key: "\337\372\210\272>\341\370\364\246\356G\230\314N\226h\327\303\214\363\325\352\315=S\364C\336\210\307fg"
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1534234539 🔎
Import Time
2:02:17 PM - 05-26-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1534234539
rx_time: 1748268135
rx_snr: -8.5
rx_rssi: -117
hop_start: 3
relay_node: 112
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
FLAC-3618(!a2e93618) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3506800091 🔎
Import Time
2:02:05 PM - 05-26-2025
packet
from: 2733192728
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3506800091
rx_time: 1748268123
rx_snr: 6.25
hop_limit: 7
rx_rssi: -30
hop_start: 7
relay_node: 24
payload
id: "!a2e93618"
long_name: "FLAC-3618"
short_name: "FLAC"
macaddr: "\314\215\242\3516\030"
hw_model: T_DECK
role: CLIENT_MUTE
public_key: "]3\255\353\305\356?=\367\024\266\300\354]\017\307v\217\236\213hzl`\374\023?\313AkT&"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1249597216 🔎
Import Time
2:02:03 PM - 05-26-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
  bitfield: 0
}
id: 1249597216
rx_time: 1748268122
rx_snr: -8.5
hop_limit: 3
rx_rssi: -116
hop_start: 7
relay_node: 112
payload
2.6.10 (git)
Greenway Park(!da63a434) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
722915564 🔎
Import Time
2:00:05 PM - 05-26-2025
packet
from: 3663963188
to: 4273316663
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 722915564
rx_time: 1748268003
rx_snr: 5.5
hop_limit: 3
rx_rssi: -83
hop_start: 3
payload
id: "!da63a434"
long_name: "Greenway Park"
short_name: "GWPK"
macaddr: "4\267\332c\2444"
hw_model: HELTEC_V3
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1666907338 🔎
Import Time
2:00:01 PM - 05-26-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1666907338
rx_time: 1748267999
rx_snr: -15.0
hop_limit: 1
rx_rssi: -125
hop_start: 3
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
XXX!(!a20a101c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2111651947 🔎
Import Time
1:59:58 PM - 05-26-2025
packet
from: 2718568476
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 2111651947
rx_time: 1748267997
rx_snr: -8.25
hop_limit: 4
rx_rssi: -118
hop_start: 7
relay_node: 112
payload
id: "!a20a101c"
long_name: "XXX!"
short_name: "XXX!"
macaddr: "\314\215\242\n\020\034"
hw_model: STATION_G2
public_key: "r\014!\211&\374\244\314P\356hm\262%\275\364D\332\344\322\240\025Xp\334\360\021\020\220H\241\\"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3927870514 🔎
Import Time
1:59:50 PM - 05-26-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3927870514
rx_time: 1748267989
rx_snr: -8.0
hop_limit: 1
rx_rssi: -117
payload
time: 1748267976
device_metrics {
  battery_level: 101
  voltage: 3.996
  channel_utilization: 3.9533331
  air_util_tx: 0.06588889
  uptime_seconds: 65
}
VE3WVJ - Mobile Node - T-Echo(!3e9fbd0f) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3950620667 🔎
Import Time
1:33:12 PM - 05-25-2025
packet
from: 1050656015
to: 4273316663
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
  bitfield: 1
}
id: 3950620667
rx_time: 1748179990
rx_snr: 5.75
hop_limit: 5
want_ack: true
rx_rssi: -34
hop_start: 5
relay_node: 15
payload
<redacted>
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1249597201 🔎
Import Time
12:50:30 PM - 05-25-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 1249597201
rx_time: 1748177429
rx_snr: -6.75
hop_limit: 2
rx_rssi: -115
hop_start: 7
relay_node: 17
payload
Ppl wo locks. UPGRADE
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736838271 🔎
Import Time
12:49:40 PM - 05-25-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736838271
rx_time: 1748177377
rx_snr: -5.5
hop_limit: 3
rx_rssi: -114
hop_start: 5
relay_node: 112
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
PrincessLeia(!47c2aebc) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
272167615 🔎
Import Time
12:19:12 PM - 05-25-2025
packet
from: 1203941052
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 272167615
rx_time: 1748175551
rx_snr: -11.0
rx_rssi: -114
hop_start: 3
relay_node: 17
payload
id: "!47c2aebc"
long_name: "PrincessLeia"
short_name: "Leia"
macaddr: "\320\244G\302\256\274"
hw_model: RAK4631
Greenway Park(!da63a434) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
722914512 🔎
Import Time
1:20:50 PM - 05-24-2025
packet
from: 3663963188
to: 4273316663
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 722914512
rx_time: 1748092848
rx_snr: 5.75
hop_limit: 3
rx_rssi: -82
hop_start: 3
payload
id: "!da63a434"
long_name: "Greenway Park"
short_name: "GWPK"
macaddr: "4\267\332c\2444"
hw_model: HELTEC_V3
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
736836959 🔎
Import Time
10:01:13 PM - 05-20-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 736836959
rx_time: 1747778471
rx_snr: -3.25
hop_limit: 3
rx_rssi: -111
hop_start: 5
relay_node: 112
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2628912741 🔎
Import Time
11:21:19 AM - 05-14-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2628912741
rx_time: 1747221677
rx_snr: -9.25
rx_rssi: -119
hop_start: 3
relay_node: 112
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
832763465 🔎
Import Time
8:21:13 AM - 05-14-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 832763465
rx_time: 1747210872
rx_snr: -12.5
rx_rssi: -121
hop_start: 3
relay_node: 112
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
211835256 🔎
Import Time
5:51:09 AM - 05-14-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 211835256
rx_time: 1747201867
rx_snr: 1.5
hop_limit: 4
rx_rssi: -107
hop_start: 5
relay_node: 17
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
Komodo T(!433c1d08) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2321663033 🔎
Import Time
4:27:07 AM - 05-14-2025
packet
from: 1128013064
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2321663033
rx_time: 1747196826
rx_snr: -18.0
rx_rssi: -125
payload
id: "!433c1d08"
long_name: "Komodo T"
short_name: "KomT"
macaddr: "H\312C<\035\010"
hw_model: HELTEC_WIRELESS_TRACKER
public_key: "\265J\253\022\037\251a\251\371~u\342\335\372\316,\214\265\201Ze\266\242\2248\267\212\212\230(\001\013"
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
130126750 🔎
Import Time
1:33:11 AM - 05-14-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 130126750
rx_time: 1747186390
rx_snr: -11.5
hop_limit: 5
rx_rssi: -119
hop_start: 5
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Minas-Tirith(!ae890e53) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3930580067 🔎
Import Time
11:45:06 PM - 05-13-2025
packet
from: 2928217683
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  request_id: 2667242439
}
id: 3930580067
rx_time: 1747179905
rx_snr: -11.75
hop_limit: 2
rx_rssi: -118
hop_start: 3
payload
id: "!ae890e53"
long_name: "Minas-Tirith"
short_name: "MiTi"
macaddr: "\345\324\256\211\016S"
hw_model: T_ECHO
public_key: "\031\226\'\265z\300B\372x\267\270D\364\2276%\257op\030=}\037(\220/\316)_\253)\010"
SiG⃤⃝Ni 𓉑-𓅓(!b03bbc2c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3068578546 🔎
Import Time
12:36:25 AM - 05-10-2025
packet
from: 2956704812
to: 4273316663
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
  bitfield: 0
}
id: 3068578546
rx_time: 1746837386
want_ack: true
priority: HIGH
hop_start: 3
relay_node: 116
payload
<redacted>
bong lips(!4358babc) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2175398058 🔎
Import Time
12:19:36 AM - 05-10-2025
packet
from: 1129888444
to: 4273316663
channel: 8
decoded {
  portnum: TRACEROUTE_APP
  want_response: true
  bitfield: 3
}
id: 2175398058
rx_time: 1746836375
hop_limit: 3
want_ack: true
priority: RELIABLE
hop_start: 3
relay_node: 188
payload
graph

                
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
130126114 🔎
Import Time
12:19:31 AM - 05-10-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 130126114
rx_time: 1746836371
hop_limit: 4
priority: RELIABLE
hop_start: 5
relay_node: 116
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Mechanicus Cadia(!4359649c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
4170646673 🔎
Import Time
12:19:15 AM - 05-10-2025
packet
from: 1129931932
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 4170646673
rx_time: 1746836353
hop_limit: 6
priority: BACKGROUND
hop_start: 6
payload
id: "!4359649c"
long_name: "Mechanicus Cadia"
short_name: "M3"
macaddr: "H\312CYd\234"
hw_model: HELTEC_V3
Mechanicus Alpha(!433e868c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1819344734 🔎
Import Time
12:19:15 AM - 05-10-2025
packet
from: 1128171148
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1819344734
rx_time: 1746836352
hop_limit: 4
priority: BACKGROUND
hop_start: 4
payload
id: "!433e868c"
long_name: "Mechanicus Alpha"
short_name: "M1"
macaddr: "H\312C>\206\214"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1410251812 🔎
Import Time
12:19:14 AM - 05-10-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 1410251812
rx_time: 1746836354
priority: DEFAULT
hop_start: 5
relay_node: 116
payload
time: 1746836341
device_metrics {
  battery_level: 101
  voltage: 4.179
  channel_utilization: 0.0
  air_util_tx: 0.016666666
  uptime_seconds: 8707
}
DIFAM West f52c(!f71ef52c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3322946183 🔎
Import Time
11:43:29 PM - 05-09-2025
packet
from: 4146001196
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3322946183
rx_time: 1746834209
priority: RELIABLE
hop_start: 3
relay_node: 116
payload
id: "!f71ef52c"
long_name: "DIFAM West f52c"
short_name: "f52c"
macaddr: "0\306\367\036\365,"
hw_model: TBEAM
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
130126110 🔎
Import Time
11:43:16 PM - 05-09-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 130126110
rx_time: 1746834195
hop_limit: 3
priority: RELIABLE
hop_start: 5
relay_node: 116
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
DC relay (!da63a46c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
788664026 🔎
Import Time
11:43:12 PM - 05-09-2025
packet
from: 3663963244
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 788664026
rx_time: 1746834181
hop_limit: 3
priority: BACKGROUND
hop_start: 3
payload
id: "!da63a46c"
long_name: "DC relay "
short_name: "Dr"
macaddr: "4\267\332c\244l"
hw_model: HELTEC_V3
role: CLIENT_MUTE
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
809592829 🔎
Import Time
11:43:12 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 809592829
rx_time: 1746834192
priority: DEFAULT
hop_start: 5
relay_node: 116
payload
time: 1746834180
device_metrics {
  battery_level: 101
  voltage: 4.149
  channel_utilization: 0.0
  air_util_tx: 0.016666666
  uptime_seconds: 6547
}
DIFAM South f568(!f71ef568) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3477982673 🔎
Import Time
11:07:16 PM - 05-09-2025
packet
from: 4146001256
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3477982673
rx_time: 1746832036
hop_limit: 1
priority: RELIABLE
hop_start: 3
relay_node: 116
payload
id: "!f71ef568"
long_name: "DIFAM South f568"
short_name: "f568"
macaddr: "0\306\367\036\365h"
hw_model: TBEAM
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
246383574 🔎
Import Time
11:07:08 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 246383574
rx_time: 1746832027
hop_limit: 1
priority: DEFAULT
hop_start: 5
relay_node: 116
payload
time: 1746832020
device_metrics {
  battery_level: 101
  voltage: 4.128
  channel_utilization: 0.0
  air_util_tx: 0.016666666
  uptime_seconds: 4386
}
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) SovereignNet Central(!ec9d4153)
2058909176 🔎
Import Time
4:46:03 PM - 05-09-2025
packet
from: 4273316663
to: 3969728851
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2058909176
rx_time: 1746809163
priority: RELIABLE
hop_start: 7
relay_node: 116
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "\307)P\244*D3p\034\'\325\377\260e3\236\032\017\321mz-\216j7\\\245>\261\311Ux"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) FLAZ-0745(!c7130745)
2702685680 🔎
Import Time
4:40:27 PM - 05-09-2025
packet
from: 4273316663
to: 3339913029
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 2702685680
rx_time: 1746808826
hop_limit: 1
priority: RELIABLE
hop_start: 7
relay_node: 60
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "\307)P\244*D3p\034\'\325\377\260e3\236\032\017\321mz-\216j7\\\245>\261\311Ux"
Meshnard(!da656bb4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2488307812 🔎
Import Time
4:15:05 PM - 05-09-2025
packet
from: 3664079796
to: 4273316663
channel: 8
decoded {
  portnum: TRACEROUTE_APP
  want_response: true
}
id: 2488307812
rx_time: 1746807304
hop_limit: 3
want_ack: true
hop_start: 3
payload
graph

                
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
2580060043 🔎
Import Time
4:06:02 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 2580060043
rx_time: 1746806761
rx_snr: -13.25
hop_limit: 1
rx_rssi: -120
hop_start: 7
payload
For all those with unlocked icons, or no lock, upgrade time!
Meshnard(!da656bb4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2488307810 🔎
Import Time
4:04:03 PM - 05-09-2025
packet
from: 3664079796
to: 4273316663
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 2488307810
rx_time: 1746806642
hop_limit: 3
want_ack: true
hop_start: 3
payload
<redacted>
DIFAM East f3b4(!f71ef3b4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
4063491292 🔎
Import Time
3:58:06 PM - 05-09-2025
packet
from: 4146000820
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 4063491292
rx_time: 1746806284
rx_snr: 6.0
rx_rssi: -52
hop_start: 3
payload
id: "!f71ef3b4"
long_name: "DIFAM East f3b4"
short_name: "f3b4"
macaddr: "0\306\367\036\363\264"
hw_model: TBEAM
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3568825653 🔎
Import Time
3:57:41 PM - 05-09-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3568825653
rx_time: 1746806260
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "medium-fast bridge cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3715942262 🔎
Import Time
3:57:41 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
  bitfield: 0
}
id: 3715942262
rx_time: 1746806259
rx_snr: 5.75
hop_limit: 3
rx_rssi: -59
hop_start: 7
payload
No lock icon? No icon? upgrade time!
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3122439431 🔎
Import Time
3:45:10 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: NODEINFO_APP
}
id: 3122439431
rx_time: 1746805509
rx_snr: 6.0
rx_rssi: -54
hop_start: 7
payload
id: "!feb5a337"
long_name: "CVE-2025-24797 REMOTE EXPLOIT < v2.6.2"
short_name: "🪰"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "\307)P\244*D3p\034\'\325\377\260e3\236\032\017\321mz-\216j7\\\245>\261\311Ux"
stealthEdge t1000-e 654e(!3aa4654e) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
230830168 🔎
Import Time
3:42:45 PM - 05-09-2025
packet
from: 983852366
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 230830168
rx_time: 1746805364
rx_snr: -6.0
hop_limit: 2
rx_rssi: -111
hop_start: 5
payload
id: "!3aa4654e"
long_name: "stealthEdge t1000-e 654e"
short_name: "sEt1"
macaddr: "\377+:\244eN"
hw_model: TRACKER_T1000_E
public_key: "N\376\345\241\032\035\231N\324\347\254\212\232\324\372\037\316\204\357\200\253F\007\247^\255\277\0227W\213E"
cedarmesh.ca directional(!da5ed63c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2783142842 🔎
Import Time
3:42:30 PM - 05-09-2025
packet
from: 3663648316
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 2783142842
rx_time: 1746805349
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 60
payload
id: "!da5ed63c"
long_name: "cedarmesh.ca directional"
short_name: "d63c"
macaddr: "4\267\332^\326<"
hw_model: HELTEC_V3
role: ROUTER_LATE
public_key: "E\316\026\320\302\377h\233\030\237\264\225\254\377O\241\276\247|\364\n\377 U&(b=\006\301{q"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3952183508 🔎
Import Time
3:42:30 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
  bitfield: 0
}
id: 3952183508
rx_time: 1746805349
rx_snr: 6.5
hop_limit: 2
rx_rssi: -59
hop_start: 7
payload
time: 1746805340
device_metrics {
  battery_level: 101
  voltage: 3.704
  channel_utilization: 5.88
  air_util_tx: 0.098000005
  uptime_seconds: 65
}
join discord @ cedarmesh.ca(!da741414) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1317671215 🔎
Import Time
3:42:30 PM - 05-09-2025
packet
from: 3665040404
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 1317671215
rx_time: 1746805350
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 20
payload
id: "!da741414"
long_name: "medium-fast bridge cedarmesh.ca"
short_name: "1414"
macaddr: "\330;\332t\024\024"
hw_model: SEEED_XIAO_S3
public_key: "\006\230D\336\260\345\\?\034\337J\306\272\027\366\314\020\252X\200\310Y\277\220^\032Z\301\314\300;k"
🥜 Peanut(!433bf6bc) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3768449161 🔎
Import Time
3:23:02 PM - 05-09-2025
packet
from: 1128003260
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3768449161
rx_time: 1746804183
rx_snr: 5.75
hop_limit: 2
rx_rssi: -54
hop_start: 7
payload
id: "!433bf6bc"
long_name: "🥜 Peanut"
short_name: "PNUT"
macaddr: "H\312C;\366\274"
hw_model: HELTEC_WIRELESS_PAPER
public_key: "\024@\311\326#jPb\2740\014\362\r\243\372\224\251\234\215\037\267\206`\227\301\020j\025\026\210|^"
Meshtastic 21c4(!849a21c4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
573024483 🔎
Import Time
3:22:51 PM - 05-09-2025
packet
from: 2224693700
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 2
}
id: 573024483
rx_time: 1746804172
rx_snr: 6.25
hop_limit: 2
rx_rssi: -53
hop_start: 5
payload
id: "!849a21c4"
long_name: "🥥 Coconut"
short_name: "COCO"
macaddr: "\260\201\204\232!\304"
hw_model: HELTEC_V3
public_key: "D\\\306\361\024\271\351\0230\003\225\360\002\351\002T\352?\226gK\324\300\375\324ed(\237\270<8"
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1982535432 🔎
Import Time
3:22:46 PM - 05-09-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1982535432
rx_time: 1746804166
rx_snr: -13.5
hop_limit: 3
rx_rssi: -113
hop_start: 5
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
DIFAM West f52c(!f71ef52c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
297636431 🔎
Import Time
3:08:33 PM - 05-09-2025
packet
from: 4146001196
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 297636431
rx_time: 1746803312
rx_snr: -7.5
hop_limit: 1
rx_rssi: -115
hop_start: 3
payload
id: "!f71ef52c"
long_name: "DIFAM West f52c"
short_name: "f52c"
macaddr: "0\306\367\036\365,"
hw_model: TBEAM
Kavetech(!bd4fa828) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1263796241 🔎
Import Time
3:08:26 PM - 05-09-2025
packet
from: 3176114216
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1263796241
rx_time: 1746803305
rx_snr: 6.0
hop_limit: 5
rx_rssi: -36
hop_start: 5
payload
id: "!bd4fa828"
long_name: "Kavetech"
short_name: "KAVE"
macaddr: "\360\365\275O\250("
hw_model: HELTEC_V3
cedarmesh.ca directional(!da5ed63c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1189761941 🔎
Import Time
3:08:23 PM - 05-09-2025
packet
from: 3663648316
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 1189761941
rx_time: 1746803301
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 60
payload
id: "!da5ed63c"
long_name: "cedarmesh.ca directional"
short_name: "d63c"
macaddr: "4\267\332^\326<"
hw_model: HELTEC_V3
role: ROUTER_LATE
public_key: "E\316\026\320\302\377h\233\030\237\264\225\254\377O\241\276\247|\364\n\377 U&(b=\006\301{q"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3715942239 🔎
Import Time
3:08:21 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 3715942239
rx_time: 1746803299
rx_snr: -5.25
hop_limit: 2
rx_rssi: -113
hop_start: 7
payload
Ack sig
stealthEdge t1000-e 654e(!3aa4654e) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3931077607 🔎
Import Time
2:52:22 PM - 05-09-2025
packet
from: 983852366
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 3931077607
rx_time: 1746802341
rx_snr: -16.25
hop_limit: 2
rx_rssi: -122
hop_start: 5
payload
id: "!3aa4654e"
long_name: "stealthEdge t1000-e 654e"
short_name: "sEt1"
macaddr: "\377+:\244eN"
hw_model: TRACKER_T1000_E
public_key: "N\376\345\241\032\035\231N\324\347\254\212\232\324\372\037\316\204\357\200\253F\007\247^\255\277\0227W\213E"
RHill Leek node fixed 📡(!b03d8ca4) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
3958948166 🔎
Import Time
2:52:12 PM - 05-09-2025
packet
from: 2956823716
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 3958948166
rx_time: 1746802331
rx_snr: -4.0
hop_limit: 2
rx_rssi: -111
hop_start: 5
payload
id: "!b03d8ca4"
long_name: "RHill Leek node fixed 📡"
short_name: "LEEK"
macaddr: "4\315\260=\214\244"
hw_model: HELTEC_V3
public_key: "\332&*\264#)\026\322%wb\202w\221\203\034_\222mg\267\372l\300\262\000\317\314\r\000\322\003"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3715942236 🔎
Import Time
2:51:53 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 3715942236
rx_time: 1746802311
rx_snr: -14.5
hop_limit: 1
rx_rssi: -122
hop_start: 7
payload
Note unlocked 🔓 means vulnerable
cedarmesh.ca directional(!da5ed63c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
4244809599 🔎
Import Time
2:49:56 PM - 05-09-2025
packet
from: 3663648316
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
  bitfield: 3
}
id: 4244809599
rx_time: 1746802195
hop_limit: 7
priority: BACKGROUND
hop_start: 7
relay_node: 60
payload
id: "!da5ed63c"
long_name: "cedarmesh.ca directional"
short_name: "d63c"
macaddr: "4\267\332^\326<"
hw_model: HELTEC_V3
role: ROUTER_LATE
public_key: "E\316\026\320\302\377h\233\030\237\264\225\254\377O\241\276\247|\364\n\377 U&(b=\006\301{q"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3715942233 🔎
Import Time
2:49:52 PM - 05-09-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TEXT_MESSAGE_APP
}
id: 3715942233
rx_time: 1746802191
rx_snr: -6.5
hop_limit: 3
rx_rssi: -113
hop_start: 7
payload
Ack 1128
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
3747154206 🔎
Import Time
9:51:16 PM - 05-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 3747154206
rx_time: 1746568275
rx_snr: -14.75
rx_rssi: -122
hop_start: 3
payload
time: 1746568270
device_metrics {
  battery_level: 36
  voltage: 3.59
  channel_utilization: 21.491667
  air_util_tx: 3.8658333
  uptime_seconds: 365363
}
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
4028246288 🔎
Import Time
10:22:34 AM - 05-06-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: NODEINFO_APP
}
id: 4028246288
rx_time: 1746526953
rx_snr: -12.75
rx_rssi: -112
hop_start: 3
payload
id: "!feb5a337"
long_name: "Meshtastic a337"
short_name: "a337"
macaddr: "\365c\376\265\2437"
hw_model: RAK4631
public_key: "L\317N\217\037\220\2723\033\021E\372\257\347,\365\257\202\301k\324\316J\331\036\337Z\224\207\322\360\037"
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
1209422060 🔎
Import Time
8:04:01 PM - 05-05-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 1209422060
rx_time: 1746475440
rx_snr: -14.25
rx_rssi: -124
hop_start: 3
payload
time: 1746475434
device_metrics {
  battery_level: 40
  voltage: 3.637
  channel_utilization: 23.776667
  air_util_tx: 3.542222
  uptime_seconds: 272527
}
PrincessLeia(!47c2aebc) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
25540171 🔎
Import Time
2:54:11 PM - 05-05-2025
packet
from: 1203941052
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 25540171
rx_time: 1746456849
rx_snr: -11.75
rx_rssi: -121
hop_start: 3
payload
id: "!47c2aebc"
long_name: "PrincessLeia"
short_name: "Leia"
macaddr: "\320\244G\302\256\274"
hw_model: RAK4631
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
33520320 🔎
Import Time
2:54:08 PM - 05-05-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 33520320
rx_time: 1746456846
rx_snr: -12.5
rx_rssi: -122
hop_start: 3
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
LGMRT(!e040c93b) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1379553935 🔎
Import Time
12:10:21 PM - 05-05-2025
packet
from: 3762342203
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1379553935
rx_time: 1746447019
rx_snr: -11.0
rx_rssi: -120
payload
id: "!e040c93b"
long_name: "LGMRT"
short_name: "RT"
macaddr: "\377\256\340@\311;"
hw_model: RAK4631
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2279339690 🔎
Import Time
12:10:05 PM - 05-05-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2279339690
rx_time: 1746447003
rx_snr: -11.25
rx_rssi: -120
hop_start: 3
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337) (^all)
2714567875 🔎
Import Time
1:24:34 PM - 05-04-2025
packet
from: 4273316663
to: 4294967295
channel: 8
decoded {
  portnum: TELEMETRY_APP
}
id: 2714567875
rx_time: 1746363674
rx_snr: 1.75
rx_rssi: -108
hop_start: 3
relay_node: 17
payload
time: 1746365062
device_metrics {
  battery_level: 45
  voltage: 3.681
  channel_utilization: 8.1883335
  air_util_tx: 3.9287221
  uptime_seconds: 162155
}
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1227223895 🔎
Import Time
5:43:26 AM - 05-03-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1227223895
rx_time: 1746251004
rx_snr: 6.75
rx_rssi: -89
hop_start: 5
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
365455758 🔎
Import Time
12:10:33 AM - 05-03-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 365455758
rx_time: 1746231033
rx_snr: 5.75
hop_limit: 1
rx_rssi: -98
hop_start: 5
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Meshtastic 406c(!da54406c) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1227223611 🔎
Import Time
3:48:02 AM - 05-02-2025
packet
from: 3662954604
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1227223611
rx_time: 1746157680
rx_snr: 6.0
hop_limit: 3
rx_rssi: -98
hop_start: 5
payload
id: "!da54406c"
long_name: "Meshtastic 406c"
short_name: "406c"
macaddr: "4\267\332T@l"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
TXRX_MISS(!da56df90) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2472735625 🔎
Import Time
3:22:36 PM - 05-01-2025
packet
from: 3663126416
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2472735625
rx_time: 1746112954
rx_snr: 6.0
rx_rssi: -87
hop_start: 3
payload
id: "!da56df90"
long_name: "TXRX_MISS"
short_name: "TXRX"
macaddr: "4\267\332V\337\220"
hw_model: HELTEC_V3
LGMRT(!e040c93b) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
1729765048 🔎
Import Time
8:41:47 AM - 04-29-2025
packet
from: 3762342203
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 1729765048
rx_time: 1745916105
rx_snr: 5.25
rx_rssi: -85
payload
id: "!e040c93b"
long_name: "LGMRT"
short_name: "RT"
macaddr: "\377\256\340@\311;"
hw_model: RAK4631
artastic-1 🇨🇦(!3369d464) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
365454754 🔎
Import Time
8:12:55 AM - 04-27-2025
packet
from: 862573668
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 365454754
rx_time: 1745741574
rx_snr: 6.0
hop_limit: 2
rx_rssi: -61
hop_start: 5
payload
id: "!3369d464"
long_name: "artastic-1 🇨🇦"
short_name: "ART1"
macaddr: "d\3503i\324d"
hw_model: HELTEC_V3
Windscribe.com(!30327d70) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
322547418 🔎
Import Time
8:12:50 AM - 04-27-2025
packet
from: 808615280
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 322547418
rx_time: 1745741569
rx_snr: 5.75
rx_rssi: -90
hop_start: 3
payload
id: "!30327d70"
long_name: "Windscribe.com"
short_name: "WS69"
macaddr: "\300N02}p"
hw_model: HELTEC_V3
role: ROUTER_CLIENT
Komodo T(!433c1d08) CVE-2025-24797 REMOTE EXPLOIT < v2.6.2(!feb5a337)
2677976236 🔎
Import Time
3:47:47 AM - 04-27-2025
packet
from: 1128013064
to: 4273316663
channel: 8
decoded {
  portnum: NODEINFO_APP
  want_response: true
}
id: 2677976236
rx_time: 1745725666
rx_snr: 5.0
rx_rssi: -96
hop_start: 4
payload
id: "!433c1d08"
long_name: "Komodo T"
short_name: "KomT"
macaddr: "H\312C<\035\010"
hw_model: HELTEC_WIRELESS_TRACKER
public_key: "\265J\253\022\037\251a\251\371~u\342\335\372\316,\214\265\201Ze\266\242\2248\267\212\212\230(\001\013"

Visit Meshview on Github.