@mattsaxon: Created pull request https://github.com/mattsaxon/HASS-Jablotron80/pull/2
@Marcel1: Something worth mentioning: a week or two ago I’ve send my sniffing results to Matt. I also discovered that we are able to discipher sensor states.
I was monitoring J-link and noticed that every sensor will light up with a yellow background when it’s triggered, just like you can see in your screenshot of F-link with cell ‘Actie’ in column ‘Status’.
In my case, device/ID/position 6 was triggered. This is the sensor which went on when passing by.
While analyzing the logfile, I wrote down the packet numbers of my recording.
I’m displaying my results as a decimal instead of hex:
315 (packet number in logfile)
82 7 138 1 4 0 0 0 243 0 0 16 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
324
82 9 138 2 4 0 142 0 1 52 8 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
328
82 9 138 3 4 32 226 3 1 114 7 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
332
82 9 138 4 4 0 206 1 252 19 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
335
82 9 138 5 4 0 88 0 252 177 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
339
82 9 138 6 12 0 3 0 252 19 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
344
82 9 138 7 4 0 31 0 252 148 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
348
82 9 138 8 4 0 250 0 252 147 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
351
82 9 138 9 4 0 110 1 252 147 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
355
82 9 138 10 4 0 223 0 252 20 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
363
82 9 138 11 4 0 46 0 252 212 10 0 244 0 0 0
0 0 0 0 12 41 0 16 0 0 0 0 12 0 0 0
1 0 0 0 217 211 0 0 0 0 0 0 100 4 0 16
11 0 0 0 124 69 0 16 0 0 0 0 151 82 3 0
and some more.
Let’s take a look at the contents of these packets.
- It looks like the first device starts with: 82 7 138.
- All other devices start with: 82 9 138.
- Then the 4th byte is the device ID.
- And the 5th byte seems to be the state of the sensor. Value 4 = off. Value 12 is on.
The fact that packet 339 contains device ID 6 and has a different state value (12) than all other packets (4) and was the only sensor here at home which has been triggered, looks like this is the data we’re looking for.
However, I wasn’t able to figure out what’s the right packet to get these packets submitted.
So in short: If we’re only able to get these packets send, I’m convinced we should be able to make sensors for HA.