tk102B clone protocol

damien6 years ago

I bought a clone of tk102b but I can not know in which protocol it communicates. I tried to decode the HEX but it does not give me much information and I do not understand the procedure described to recover the protocol. We are asked to look in a .py
Could someone explain to me how to do it?
Here are my HEX data:

2019-01-27 11:50:52  INFO: [d5d33806: 5023 < 37.171.179.90] HEX: 283038373037333834363033364250303048534f29
2019-01-27 11:51:47  INFO: [d5d33806: 5023 < 37.171.179.90] HEX: 283038373037333834363033364252303031393031323741343633342e353937314e30303332302e32313037453030302e323131353134353030302e30302c30303030303030304c303030303030303029

which will give: (087073846036BR00190127A4634.5971N00320.2107E000.2115145000.00,00000000L00000000)

thanks in advance !

Anton Tananaev6 years ago

Use port 5002. Next time you should read this:

https://www.traccar.org/clones/

damien6 years ago

Thx a lot !