Today I noticed crazy amount of queries from my ASH26-W amcrest camera (90K in a 3 hour period), updated the firmware, it also got worse… I finally got it to stop by disabling stuff through the web API. These were the domains discovered through pihole: drs.zencamcloud.com
and p2pasplus.zencamcloud.com
If your amcrest camera supports it, start with this command in a web browser (You’ll need the username:password) it will show you all the configs:
http://Your-CAM-IP/cgi-bin/configManager.cgi?action=getConfig&name=All
Eureka moment when I found the domains with the associated configs: T2UServer
& VSP_PaaS
For example,T2UServer
config looked like this:
http://Your-CAM-IP/cgi-bin/configManager.cgi?action=getConfig&name=T2UServer
table.T2UServer.Enable=true
table.T2UServer.HttpsRegisterPort=12367
table.T2UServer.Key=[redacted]
table.T2UServer.Port=8800
table.T2UServer.RecvBufferSize=524288
table.T2UServer.RegisterPort=12366
table.T2UServer.RegisterServer=p2pasplus.zencamcloud.com
table.T2UServer.ThreadNum=1
table.T2UServer.Type=dhp2p
table.T2UServer.UUID=[redacted]
table.T2UServer.Username=[redacted]
table.T2UServer.WebVersion=2.420.0
Ran these commands to disable each feature:
http://Your-CAM-IP/cgi-bin/configManager.cgi?action=setConfig&T2UServer.Enable=false
and
http://Your-CAM-IP/cgi-bin/configManager.cgi?action=setConfig&VSP_PaaS.Enable=false
If you use any Amcrest apps, these commands will probably break functionality use caution. I run all my cams locally with blueiris and HA, didn’t break anything for me.