Try Megastek protocol.
This is what I got when using port 5024 for Megastek protocol:
2019-03-09 13:28:56 INFO: [7448d03a: 5024 < 191.156.25.176] HEX: 2a4d473230313836373238323033333739343237382c41422641313632363037303530333034393630373532383830353233303030303038303331392650303733323030303030383863376533382645313930333039313332383532264230303030303030303230264e3233265a30302659303030303026555f50000000000000000000000000000026543030303223
2019-03-09 13:29:02 INFO: [7448d03a: 5024 < 191.156.25.176] HEX: 2a4d473230313836373238323033333739343237382c41422641313632363037303530333034393630373532383830353233303030303038303331392650303733323030303030383863376533382645313930333039313332393032264230303030303030303230264e3233265a30302659303030303026555f50000000000000000000000000000026543030303323
Thanks.
This is the documentacion protocol from vendor. If you could double-check it, would be great.
https://www.dropbox.com/s/1zi51qc0flqlabp/T6A-GPS%20Tracker%20Protocol%20V2.0.1.57%20.pdf?dl=0
Thanks.
I got these other logs when using port 5001:
2019-03-09 08:55:17 INFO: [af8548ef: 5001 < 18.212.89.68] HEX: 16030101200100011c0303c89b88c7363f38b4dc5e20339b376351c9183e5f37ccf98576df393131ddadaa207088d86f3acea2322b222c4393c2faf22aab4f48b359a5e375aa4365b434ead4003e130213031301c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff01000095000b000403000102000a000c000a001d0017001e00190018002300000016000000170000000d0030002e040305030603080708080809080a080b080408050806040105010601030302030301020103020202040205020602002b0009080304030303020301002d00020101003300260024001d0020fb2e90a82c200106b78f373db25c30dc44b9ac5afff7c8c41226e99b83517035
2019-03-09 11:48:26 INFO: [f9f41b71: 5001 < 46.17.47.164] HEX: 474554202f613262696c6c696e672f637573746f6d65722f74656d706c617465732f64656661756c742f666f6f7465722e74706c20485454502f312e310d0a486f73743a203230342e39332e3136312e3233313a353030310d0a436f6e6e656374696f6e3a206b6565702d616c6976650d0a4163636570742d456e636f64696e673a20677a69702c206465666c6174650d0a4163636570743a202a2f2a0d0a557365722d4167656e743a20707974686f6e2d72657175657374732f322e32302e310d0a0d0a
2019-03-09 11:48:27 INFO: [18f1a47f: 5001 < 46.17.47.164] HEX: 16030100de010000da0303c26cd16cfdfa99eac18cac4b5e2e7e011d354d27cc7863179aefaf7f43bb8d9d00006ec030c02cc032c02ec02fc02bc031c02d00a500a300a1009f00a400a200a0009ec028c024c014c00ac02ac026c00fc005006b006a006900680039003800370036c027c023c013c009c029c025c00ec00400670040003f003e0033003200310030009d009c003d0035003c002f00ff01000043000b000403000102000a000a0008001700190018001600230000000d0020001e060106020603050105020503040104020403030103020303020102020203000f000101
2019-03-09 12:04:37 INFO: [d64df3fe: 5001 < 46.17.47.164] HEX: 474554202f7265636f7264696e67732f20485454502f312e310d0a486f73743a203230342e39332e3136312e3233313a353030310d0a436f6e6e656374696f6e3a206b6565702d616c6976650d0a4163636570742d456e636f64696e673a20677a69702c206465666c6174650d0a4163636570743a202a2f2a0d0a557365722d4167656e743a20707974686f6e2d72657175657374732f322e32302e310d0a0d0a
2019-03-09 12:04:39 INFO: [d1ae3dc9: 5001 < 46.17.47.164] HEX: 16030100de010000da0303e05abff3a6108535c853830d2c4aec9f679a7936b877ff744d34eaf1e5114a4900006ec030c02cc032c02ec02fc02bc031c02d00a500a300a1009f00a400a200a0009ec028c024c014c00ac02ac026c00fc005006b006a006900680039003800370036c027c023c013c009c029c025c00ec00400670040003f003e0033003200310030009d009c003d0035003c002f00ff01000043000b000403000102000a000a0008001700190018001600230000000d0020001e060106020603050105020503040104020403030103020303020102020203000f000101
2019-03-09 12:17:26 INFO: [4c2a39ff: 5001 < 46.17.47.164] HEX: 16030100de010000da03035fcb8f1ea6c512fdb1c1f52f1122df7703567ac9348b333583fd5840c7d4ac4d00006ec030c02cc032c02ec02fc02bc031c02d00a500a300a1009f00a400a200a0009ec028c024c014c00ac02ac026c00fc005006b006a006900680039003800370036c027c023c013c009c029c025c00ec00400670040003f003e0033003200310030009d009c003d0035003c002f00ff01000043000b000403000102000a000a0008001700190018001600230000000d0020001e060106020603050105020503040104020403030103020303020102020203000f000101
Thanks.
Hi,
I have been trying to read data frames sent from T6A device. I am receiving these traces:
867282033794278 is the IMEI. Can anyone know which protocol is it using?
Thanks in advance.