Plug-in Surge Adaptor
Model NO: R9P142AB00
ELECTICAL PATING:16A-250V~50Hz
802.11 WI-FI based.
Power Measurement of Voltage, Current, Frequency,
Instantaneous Power, Accumilated power
consumption and power factor.
CAT II
[T3] Uoc: 6kV Up:1,4 kV Uc: 250V~ IL: 16Aµ
IP20 Use in dry location &for Indoor use only
Connect to earthed sources only
Nicht hinter… slecken
WARNING: THIS DEVICE SHOULD NOT BE
USED WITH AQUARIUMS,NEAR WATER
SP ANY OTHER SOURCE OF MOISTURE.
MADE IN CHINA
Today I have to control it by Vattenfalls own app, called EnergyWatch. Would be awesome if they can be added to HASS…
Try to sniff the traffic with Wireshark.
I did it in the past with a WiFi LED-dimmer like this:
Modem/router >>>networkcable>>> PC (with Wireshark) >>>network cable> Accespoint (connected to second networkadapter in PC) >>> device you want to sniff.
You let the device connect to the accespoint (or old router with DHCP off) that you have connected to your PC. That way the traffic is forced to go through your PC and gives you the ability to sniff the traffic. If you are lucky it is some plain HTTP stuff and not TLS encrypted or so.
I have a similar device. I had a brief look at reverse engineering it, but didn’t come much more than the guy in the link you posted.
It seems that the remote cloud host IP is hard-coded, which makes it difficult to redirect this information.You’d typically need to do some black magic on your router. Also, if I remember correctly, the data was encrypted, which is good from a privacy point of view, but bad from an interception PoV, since it makes it harder (or impossible) to put up a MitM proxy to intercept the data before sending it to Vattenfall.