Aucun soucis depuis 5 ans, mais ... depuis cette nuit plus aucune sonde :(

Bonjour,

Je suis en 4.2A - debian 10.6 - RFXCOM version 433E

Depuis cette nuit 1:00 environ, plus aucune sonde oregon ne répond (température, anémomètre) , par contre les commandes somfy heureusement sont toujours ok

J’ai réinstallé le plugin, relancer les dépendances, refait une mise à jour du firmware (je suis en 1043), un seul protocole le 18, relancer jeedom, esxi … J’avoue ne plus rien comprendre, le passage à la nouvelle version en décembre c’était fait sans soucis.

Dernier point, aucune inclusion de mes sondes ne fonctionnent, par les appareils des voisins sont bien inclus (0x10, 0x11, 0x20) !!!

log dépendance :

********************************************************
*             Installation des dépendances             *
********************************************************
Hit:1 http://security.debian.org/debian-security buster/updates InRelease
Hit:2 http://deb.debian.org/debian buster InRelease
Hit:3 http://deb.debian.org/debian buster-updates InRelease
Hit:4 http://phoscon.de/apt/deconz buster InRelease
Reading package lists...
Skipping serial as it is not installed.
WARNING: apt does not have a stable CLI interface. Use with caution in scripts.
Reading package lists...
Building dependency tree...
Reading state information...
Package 'python3-serial' is not installed, so not removed
The following packages were automatically installed and are no longer required:
linux-image-4.19.0-11-amd64 python3-asn1crypto python3-cffi-backend
python3-entrypoints
Use 'sudo apt autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded.
Reading package lists...
Building dependency tree...
Reading state information...
python3-pip is already the newest version (18.1-5).
python3 is already the newest version (3.7.3-1).
python3-pyudev is already the newest version (0.21.0-1).
python3-requests is already the newest version (2.21.0-1).
The following packages were automatically installed and are no longer required:
linux-image-4.19.0-11-amd64 python3-asn1crypto python3-cffi-backend
python3-entrypoints
Use 'sudo apt autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 4 not upgraded.
Collecting pyserial
Downloading https://files.pythonhosted.org/packages/07/bc/587a445451b253b285629263eb51c2d8e9bcea4fc97826266d186f96f558/pyserial-3.5-py2.py3-none-any.whl (90kB)
Installing collected packages: pyserial
Successfully installed pyserial-3.5
********************************************************
*             Installation terminée                    *
********************************************************

Log lancement :

[2021-01-17 15:39:29]DEBUG : Signal 15 caught, exiting...
[2021-01-17 15:39:29]DEBUG : Shutdown
[2021-01-17 15:39:29]DEBUG : Removing PID file /tmp/jeedom/rfxcom/deamon.pid
[2021-01-17 15:39:31]INFO : Lancement démon rfxcomd : /usr/bin/python3 /var/www/html/plugins/rfxcom/resources/rfxcomd/rfxcomd.py --device auto --loglevel debug --socketport 55000 --serialrate 38400 --protocol 18 --callback http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php --apikey Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 --cycle 0.3 --pid /tmp/jeedom/rfxcom/deamon.pid
[2021-01-17 15:39:32]INFO : Start rfxcomd
[2021-01-17 15:39:32]INFO : Log level : debug
[2021-01-17 15:39:32]INFO : Socket port : 55000
[2021-01-17 15:39:32]INFO : Socket host : 127.0.0.1
[2021-01-17 15:39:32]INFO : PID file : /tmp/jeedom/rfxcom/deamon.pid
[2021-01-17 15:39:32]INFO : Device : auto
[2021-01-17 15:39:32]INFO : Apikey : Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2
[2021-01-17 15:39:32]INFO : Callback : http://127.0.0.1:80/plugins/rfxcom/core/php/jeeRfxcom.php
[2021-01-17 15:39:32]INFO : Cycle : 0.3
[2021-01-17 15:39:32]INFO : Serial rate : 38400
[2021-01-17 15:39:32]INFO : Serial timeout : 9
[2021-01-17 15:39:32]INFO : Protocol : 18
[2021-01-17 15:39:32]INFO : Find device : /dev/ttyUSB0
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x01 : Interface Response Message
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x02 : Receiver/Transmitter Message
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x10 : Lighting1 (X10, ARC, ELRO, Waveman, EMW200, IMPULS,RisingSun, Philips, Energenie, GDR2, HQ, Oase)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x11 : Lighting2 (AC, HomeEasy EU, ANSLUT, Kambrook)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x13 : Lighting4 (PT2262)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x14 : Lighting5 ( LightwaveRF, Siemens, EMW100, BBSB, MDREMOTE,RSL2, OTIO, Livolo, RGB, Aoke relay, Eurodomest, RGB432W, Legrand,Avantek, IT, Kangtai)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x15 : Lighting6 (Blyss (AE), Cuveo)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x16 : Chime (Byron SX, Byron MP001, SelectPlus, Envivo, Alfawise)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x17 : Fan (Siemens SF01, Itho, LucciAir, SEAV,Westinghouse,Casafan,FT1211R,Novy)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x19 : Blinds1 (RollerTrol,Hasta,A-OK,Raex, Media Mount, DC)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1C : Edisio
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1D : Honeywell ActivLink
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1E : FunkBus
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1F : Hunter Fan
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x20 : Security1 (X10, KD101, Visonic, Meiantech, SA30, SA33, RM174RF)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x21 : Security2 (KeeLoq)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x28 : Camera1 (Ninja/Robocam)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x30 : Remote control and IR (ATI, Medion, PC Remote)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x40 : Thermostat1 (Digimax)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x42 : Thermostat3 (Mertik-Maxitrol G6R-H4 type)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x4E : BBQ Temperature sensors (BBQ1)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x4F : Temperature and rain sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x50 : Temperature sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x51 : Humidity sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x52 : Temperature and humidity sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x53 : Barometric sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x54 : Temperature, humidity and barometric sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x55 : Rain sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x56 : Wind sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x57 : UV sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x58 : Date/time sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x59 : Current sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5A : Current sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5B : Current + ENERGY sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5C : Power sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5D : Weighting scale
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x60 : CARTELECTRONIC
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x70 : RFXsensor
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x71 : RFXMeter
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x72 : FS20 (FS20, FHT 8V, FHT80)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x76 : Weather stations (WEATHER1-WEATHER2)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x77 : SOLAR1
[2021-01-17 15:39:32]DEBUG : Writing PID 5361 to /tmp/jeedom/rfxcom/deamon.pid
[2021-01-17 15:39:32]DEBUG : Init request module v2.21.0
[2021-01-17 15:39:32]DEBUG : Starting new HTTP connection (1): 127.0.0.1:80
[2021-01-17 15:39:32]DEBUG : null
[2021-01-17 15:39:32]DEBUG : http://127.0.0.1:80 "GET /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
[2021-01-17 15:39:32]DEBUG : Init serial module v3.5
[2021-01-17 15:39:32]DEBUG : Start listening...
[2021-01-17 15:39:32]DEBUG : Socket interface started
[2021-01-17 15:39:32]DEBUG : LoopNetServer Thread started
[2021-01-17 15:39:32]DEBUG : Open serial port on device: /dev/ttyUSB0, rate 38400, timeout : 9
[2021-01-17 15:39:32]DEBUG : Listening on: [127.0.0.1:55000]
[2021-01-17 15:39:32]DEBUG : Open Serialport
[2021-01-17 15:39:32]DEBUG : flushOutput serial port
[2021-01-17 15:39:32]DEBUG : flushInput serial port
[2021-01-17 15:39:32]DEBUG : flushOutput serial port
[2021-01-17 15:39:32]DEBUG : flushInput serial port
[2021-01-17 15:39:32]DEBUG : Read Socket Thread Launched
[2021-01-17 15:39:32]DEBUG : Read Device Thread Launched
[2021-01-17 15:39:33]DEBUG : Send rfxcomd_reset
[2021-01-17 15:39:33]DEBUG : Write data to serial port : 0d00000000000000000000000000
[2021-01-17 15:39:33]DEBUG : Sleep 1 sec
[2021-01-17 15:39:34]DEBUG : flushInput serial port
[2021-01-17 15:39:34]DEBUG : Send get status test
[2021-01-17 15:39:34]DEBUG : Write data to serial port : 0d00000102000000000000000000
[2021-01-17 15:39:34]DEBUG : Message: 1401000102532b0000200001031c05674658434f4d
[2021-01-17 15:39:34]DEBUG : Decode : 1401000102532b0000200001031c05674658434f4d
[2021-01-17 15:39:34]DEBUG : Test message: 1401000102532b0000200001031c05674658434f4d
[2021-01-17 15:39:34]DEBUG : PacketType: 0x01
[2021-01-17 15:39:34]DEBUG : Length: 21
[2021-01-17 15:39:34]DEBUG : Start decoding packet type 0x01
[2021-01-17 15:39:34]DEBUG : Data : {'packetlen': '0x14', 'packettype': '0x01', 'subtype': '0x00', 'seqnbr': '0x01', 'cmnd': '0x02', 'msg1': '0x53', 'msg2': '0x2B', 'msg3': '0x00', 'msg4': '0x00', 'msg5': '0x20', 'msg6': '0x00', 'msg7': '0x01', 'msg8': '0x03', 'msg9': 28, 'msg10': '0x05', 'msg11': '0x67', 'msg12': '0x46', 'msg13': '0x58', 'msg14': '0x43', 'msg15': '0x4F', 'msg16': '0x4D'}
[2021-01-17 15:39:34]DEBUG : Subtype = response on a mode command
[2021-01-17 15:39:34]DEBUG : Firmware version = 0x2B
[2021-01-17 15:39:34]DEBUG : RFXtrx433 operating at 433.92MHz
[2021-01-17 15:39:34]DEBUG : Hardware major version = 0x01
[2021-01-17 15:39:34]DEBUG : Hardware minor version = 0x03
[2021-01-17 15:39:34]DEBUG : Output power = 10 dBm
[2021-01-17 15:39:34]DEBUG : Firmware Pro1
[2021-01-17 15:39:34]DEBUG : Noise level (only used in special firmware) = 0x67
[2021-01-17 15:39:34]DEBUG : undec on : 0
[2021-01-17 15:39:34]DEBUG : Imagintronix,Opus/Alecto2010/Alecto : 0
[2021-01-17 15:39:34]DEBUG : Byron SX,SelectPlus/Alecto5500 : 0
[2021-01-17 15:39:34]DEBUG : RSL,Revolt/La Crosse : 0
[2021-01-17 15:39:34]DEBUG : Lighting4/Davis EU : 0
[2021-01-17 15:39:34]DEBUG : FineOffset,Viking/Davis US : 0
[2021-01-17 15:39:34]DEBUG : Rubicson,Alecto,Banggood/Davis AU : 0
[2021-01-17 15:39:34]DEBUG : AE Blyss : 0
[2021-01-17 15:39:34]DEBUG : BlindsTx : 0
[2021-01-17 15:39:34]DEBUG : BlindsT0 : 0
[2021-01-17 15:39:34]DEBUG : Proguard : 0
[2021-01-17 15:39:34]DEBUG : Legrand CAD : 0
[2021-01-17 15:39:34]DEBUG : La Crosse : 0
[2021-01-17 15:39:34]DEBUG : Hideki,TFA,Cresta,UPM/FS20 : 0
[2021-01-17 15:39:34]DEBUG : AD LightwaveRF : 0
[2021-01-17 15:39:34]DEBUG : Mertik/Edisio : 0
[2021-01-17 15:39:34]DEBUG : Visonic : 0
[2021-01-17 15:39:34]DEBUG : ATI/cartelectronic/Meiantech,Atlantic : 0
[2021-01-17 15:39:34]DEBUG : Oregon Scientific/Keeloq : 1
[2021-01-17 15:39:34]DEBUG : Meiantech,Atlantic/Proguard : 0
[2021-01-17 15:39:34]DEBUG : HomeEasy EU : 0
[2021-01-17 15:39:34]DEBUG : AC : 0
[2021-01-17 15:39:34]DEBUG : ARC : 0
[2021-01-17 15:39:34]DEBUG : X10 : 0
[2021-01-17 15:39:34]DEBUG : FunkBus 433.42/Itho CVE RFT : 0
[2021-01-17 15:39:34]DEBUG : MCZ 434.50/Itho CVE ECO RFT : 0
[2021-01-17 15:39:34]DEBUG : Honeywell Chime : 0
[2021-01-17 15:39:34]DEBUG : HomeConfort,Fan : 0
[2021-01-17 15:39:34]DEBUG : Keeloq : 0
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39354]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"00024750"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39354]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39356]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"46"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39356]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39358]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"510105"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39358]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39360]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"E402"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39360]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39362]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"7E2F22"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39362]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39364]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"7E2F22"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39364]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39366]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"AD52"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39366]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39368]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"415203"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39368]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39370]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"564ADC"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39370]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39372]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"0111D7FE"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39372]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39374]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"4B01"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39374]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39376]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"6FFB5C"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39376]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39378]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"6500"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39378]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39380]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659994"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39380]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39382]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"F401"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39382]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39384]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"1304"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39384]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39386]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"4AF622"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39386]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39388]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"2F04"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39388]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39390]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659995"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39390]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39392]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659989"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39392]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39394]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659992"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39394]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39396]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659997"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39396]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39398]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"659991"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39398]
[2021-01-17 15:39:34]DEBUG : Client connected to [127.0.0.1:39400]
[2021-01-17 15:39:34]DEBUG : Message read from socket: b'{"apikey":"Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2","cmd":"add","device":{"id":"700F00"}}'
[2021-01-17 15:39:34]DEBUG : Client disconnected from [127.0.0.1:39400]
[2021-01-17 15:39:34]INFO : Démon RFXcom lancé
[2021-01-17 15:39:34]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:34]DEBUG : Add device : {'id': '00024750'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '46'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '510105'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': 'E402'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '7E2F22'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '7E2F22'}
[2021-01-17 15:39:35]DEBUG : msg3: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-01-17 15:39:35]DEBUG : msg4: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-01-17 15:39:35]DEBUG : msg5: [0, 0, 1, 0, 0, 0, 0, 0] / 20
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : msg6: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-01-17 15:39:35]DEBUG : Add device : {'id': 'AD52'}
[2021-01-17 15:39:35]DEBUG : Command: 0d00000203531C00002000000000
[2021-01-17 15:39:35]DEBUG : Protocol actually activated 00002000
[2021-01-17 15:39:35]DEBUG : Actual Frequency 53
[2021-01-17 15:39:35]DEBUG : Wanted protocol 00002000
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '415203'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '564ADC'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '0111D7FE'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE
[2021-01-17 15:39:35]DEBUG : Add device : {'id': '4B01'}
[2021-01-17 15:39:35]DEBUG : Message received in socket JEEDOM_SOCKET_MESSAGE

Slt …
Est-ce un RFXCOM version 433E ?

Oui, pardon, j’ai oublié de le préciser, il tourne depuis plus de 5 ans sans soucis (avant jeedom sur HomeSeer)

Un petit test rapide, si tu peux coupe l’alimention totale du system … et relance le tout …
Pour info j’ai un RFXCOM version 433E version 1043 (Firmware Pro1) sur RPI3B en version 4.2, pour test , pas de problème …

Tu n’as activé que le Oregon Scientific/Keeloq , est-ce voulu ?

Je n’utilise que mes commandes somfy, des orégon pour la température plus une sonde ampèremétrique, normalement seul l18 est utile, je tournais avant avec les 21-23 mais je les avais enlevé en décembre suita à nettoyage pour la nouvelle version du plugin.

J’ai déja relancé l’esxi (ce qui coupe physiquement la machine jeedom).

De mon coté, pareil, jamais eude soucis jusqu’à cette nuit :frowning:

je me demande si ce protocole 18 est bien lancé d’ailleurs :frowning:

Regarde dans le log en mode debug , on remonte les infos des protocoles dans l’ordre comme sur le RFXmngr .

tiré du log au dessus :

[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x01 : Interface Response Message
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x02 : Receiver/Transmitter Message
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x10 : Lighting1 (X10, ARC, ELRO, Waveman, EMW200, IMPULS,RisingSun, Philips, Energenie, GDR2, HQ, Oase)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x11 : Lighting2 (AC, HomeEasy EU, ANSLUT, Kambrook)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x13 : Lighting4 (PT2262)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x14 : Lighting5 ( LightwaveRF, Siemens, EMW100, BBSB, MDREMOTE,RSL2, OTIO, Livolo, RGB, Aoke relay, Eurodomest, RGB432W, Legrand,Avantek, IT, Kangtai)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x15 : Lighting6 (Blyss (AE), Cuveo)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x16 : Chime (Byron SX, Byron MP001, SelectPlus, Envivo, Alfawise)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x17 : Fan (Siemens SF01, Itho, LucciAir, SEAV,Westinghouse,Casafan,FT1211R,Novy)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x19 : Blinds1 (RollerTrol,Hasta,A-OK,Raex, Media Mount, DC)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1C : Edisio
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1D : Honeywell ActivLink
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1E : FunkBus
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x1F : Hunter Fan
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x20 : Security1 (X10, KD101, Visonic, Meiantech, SA30, SA33, RM174RF)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x21 : Security2 (KeeLoq)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x28 : Camera1 (Ninja/Robocam)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x30 : Remote control and IR (ATI, Medion, PC Remote)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x40 : Thermostat1 (Digimax)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x42 : Thermostat3 (Mertik-Maxitrol G6R-H4 type)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x4E : BBQ Temperature sensors (BBQ1)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x4F : Temperature and rain sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x50 : Temperature sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x51 : Humidity sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x52 : Temperature and humidity sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x53 : Barometric sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x54 : Temperature, humidity and barometric sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x55 : Rain sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x56 : Wind sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x57 : UV sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x58 : Date/time sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x59 : Current sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5A : Current sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5B : Current + ENERGY sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5C : Power sensors
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x5D : Weighting scale
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x60 : CARTELECTRONIC
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x70 : RFXsensor
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x71 : RFXMeter
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x72 : FS20 (FS20, FHT 8V, FHT80)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x76 : Weather stations (WEATHER1-WEATHER2)
[2021-01-17 15:39:32]DEBUG : Load decoder packet type 0x77 : SOLAR1

on passe de 0x17 à 0x19 dans la liste mais je ne sais pas ce que cela signifie

c’est les protocoles pour le décodage du packetType
Toi vers le 0x5x

[2021-01-17 15:39:34]DEBUG : Oregon Scientific/Keeloq : 1 c’est le 19eme donc 18 le 0 undec

[2021-01-17 15:39:35]DEBUG : msg3: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-01-17 15:39:35]DEBUG : msg4: [0, 0, 0, 0, 0, 0, 0, 0] / 00
[2021-01-17 15:39:35]DEBUG : msg5: [0, 0, 1, 0, 0, 0, 0, 0] / 20

Ici on le voit aussi le bit est à 1

oui sur les équipements c’est 0x50, 0x52, 0x56, ils sont bien dans la liste

Le log est OK après redémarrage ?

idem ceux du dessus, et rien d’anormal dans les autres :frowning:

Alors essaye de faire Test avec le maxi de protocoles activés possible en 433.92
Soit tout sauf 0/1/8/9/17/24 (sauvegardes et regardes log) si tu vois des 0x5x

du 0x10 et 0x11 (les voisins) mais rien d’autres :frowning:

0001|[2021-01-17 16:36:45][DEBUG] : Decode : 071001b946050070
0002|[2021-01-17 16:36:45][DEBUG] : Test message: 071001b946050070
0003|[2021-01-17 16:36:45][DEBUG] : PacketType: 0x10
0004|[2021-01-17 16:36:45][DEBUG] : Length: 8
0005|[2021-01-17 16:36:45][DEBUG] : Start decoding packet type 0x10
0006|[2021-01-17 16:36:45][DEBUG] : Subtype = ARC
0007|[2021-01-17 16:36:45][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xB9', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0008|[2021-01-17 16:36:45][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0009|[2021-01-17 16:36:45][DEBUG] : Device is known id : 46
0010|[2021-01-17 16:36:46][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0011|[2021-01-17 16:36:46][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0012|[2021-01-17 16:36:46][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0013|[2021-01-17 16:36:46][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0014|[2021-01-17 16:36:46][DEBUG] : Message: 0b1100ba0002475003000070
0015|[2021-01-17 16:36:46][DEBUG] : Decode : 0b1100ba0002475003000070
0016|[2021-01-17 16:36:46][DEBUG] : Test message: 0b1100ba0002475003000070
0017|[2021-01-17 16:36:46][DEBUG] : PacketType: 0x11
0018|[2021-01-17 16:36:46][DEBUG] : Length: 12
0019|[2021-01-17 16:36:46][DEBUG] : Start decoding packet type 0x11
0020|[2021-01-17 16:36:46][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0021|[2021-01-17 16:36:46][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xBA', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0022|[2021-01-17 16:36:46][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0023|[2021-01-17 16:36:46][DEBUG] : Device is known id : 00024750
0024|[2021-01-17 16:36:47][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0025|[2021-01-17 16:36:47][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0026|[2021-01-17 16:36:47][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0027|[2021-01-17 16:36:47][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0028|[2021-01-17 16:36:47][DEBUG] : Message: 071001bb46050070
0029|[2021-01-17 16:36:47][DEBUG] : Decode : 071001bb46050070
0030|[2021-01-17 16:36:47][DEBUG] : Test message: 071001bb46050070
0031|[2021-01-17 16:36:47][DEBUG] : PacketType: 0x10
0032|[2021-01-17 16:36:47][DEBUG] : Length: 8
0033|[2021-01-17 16:36:47][DEBUG] : Start decoding packet type 0x10
0034|[2021-01-17 16:36:47][DEBUG] : Subtype = ARC
0035|[2021-01-17 16:36:47][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xBB', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0036|[2021-01-17 16:36:47][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0037|[2021-01-17 16:36:47][DEBUG] : Device is known id : 46
0038|[2021-01-17 16:36:47][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0039|[2021-01-17 16:36:47][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0040|[2021-01-17 16:36:47][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0041|[2021-01-17 16:36:47][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0042|[2021-01-17 16:36:48][DEBUG] : Message: 0b1100bc0002475003000070
0043|[2021-01-17 16:36:48][DEBUG] : Decode : 0b1100bc0002475003000070
0044|[2021-01-17 16:36:48][DEBUG] : Test message: 0b1100bc0002475003000070
0045|[2021-01-17 16:36:48][DEBUG] : PacketType: 0x11
0046|[2021-01-17 16:36:48][DEBUG] : Length: 12
0047|[2021-01-17 16:36:48][DEBUG] : Start decoding packet type 0x11
0048|[2021-01-17 16:36:48][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0049|[2021-01-17 16:36:48][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xBC', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0050|[2021-01-17 16:36:48][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0051|[2021-01-17 16:36:48][DEBUG] : Device is known id : 00024750
0052|[2021-01-17 16:36:48][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0053|[2021-01-17 16:36:48][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0054|[2021-01-17 16:36:48][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0055|[2021-01-17 16:36:48][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0056|[2021-01-17 16:36:48][DEBUG] : Message: 0b1101bd0002441003000070
0057|[2021-01-17 16:36:48][DEBUG] : Decode : 0b1101bd0002441003000070
0058|[2021-01-17 16:36:48][DEBUG] : Test message: 0b1101bd0002441003000070
0059|[2021-01-17 16:36:48][DEBUG] : PacketType: 0x11
0060|[2021-01-17 16:36:48][DEBUG] : Length: 12
0061|[2021-01-17 16:36:48][DEBUG] : Start decoding packet type 0x11
0062|[2021-01-17 16:36:48][DEBUG] : Subtype = HomeEasy EU
0063|[2021-01-17 16:36:48][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xBD', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0064|[2021-01-17 16:36:48][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0065|[2021-01-17 16:36:48][DEBUG] : unknown device id : 00024410
0066|[2021-01-17 16:36:49][DEBUG] : Message: 071001be46050070
0067|[2021-01-17 16:36:49][DEBUG] : Decode : 071001be46050070
0068|[2021-01-17 16:36:49][DEBUG] : Test message: 071001be46050070
0069|[2021-01-17 16:36:49][DEBUG] : PacketType: 0x10
0070|[2021-01-17 16:36:49][DEBUG] : Length: 8
0071|[2021-01-17 16:36:49][DEBUG] : Start decoding packet type 0x10
0072|[2021-01-17 16:36:49][DEBUG] : Subtype = ARC
0073|[2021-01-17 16:36:49][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xBE', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0074|[2021-01-17 16:36:49][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0075|[2021-01-17 16:36:49][DEBUG] : Device is known id : 46
0076|[2021-01-17 16:36:49][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0077|[2021-01-17 16:36:49][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0078|[2021-01-17 16:36:49][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0079|[2021-01-17 16:36:49][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0080|[2021-01-17 16:36:50][DEBUG] : Message: 0b1100bf0002475003000070
0081|[2021-01-17 16:36:50][DEBUG] : Decode : 0b1100bf0002475003000070
0082|[2021-01-17 16:36:50][DEBUG] : Test message: 0b1100bf0002475003000070
0083|[2021-01-17 16:36:50][DEBUG] : PacketType: 0x11
0084|[2021-01-17 16:36:50][DEBUG] : Length: 12
0085|[2021-01-17 16:36:50][DEBUG] : Start decoding packet type 0x11
0086|[2021-01-17 16:36:50][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0087|[2021-01-17 16:36:50][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xBF', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0088|[2021-01-17 16:36:50][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0089|[2021-01-17 16:36:50][DEBUG] : Device is known id : 00024750
0090|[2021-01-17 16:36:50][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0091|[2021-01-17 16:36:50][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0092|[2021-01-17 16:36:50][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0093|[2021-01-17 16:36:50][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0094|[2021-01-17 16:36:50][DEBUG] : Message: 0b1101c00002441003000070
0095|[2021-01-17 16:36:50][DEBUG] : Decode : 0b1101c00002441003000070
0096|[2021-01-17 16:36:50][DEBUG] : Test message: 0b1101c00002441003000070
0097|[2021-01-17 16:36:50][DEBUG] : PacketType: 0x11
0098|[2021-01-17 16:36:50][DEBUG] : Length: 12
0099|[2021-01-17 16:36:50][DEBUG] : Start decoding packet type 0x11
0100|[2021-01-17 16:36:50][DEBUG] : Subtype = HomeEasy EU
0101|[2021-01-17 16:36:50][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xC0', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0102|[2021-01-17 16:36:50][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0103|[2021-01-17 16:36:50][DEBUG] : unknown device id : 00024410
0104|[2021-01-17 16:36:50][DEBUG] : Message: 071001c146050070
0105|[2021-01-17 16:36:50][DEBUG] : Decode : 071001c146050070
0106|[2021-01-17 16:36:50][DEBUG] : Test message: 071001c146050070
0107|[2021-01-17 16:36:50][DEBUG] : PacketType: 0x10
0108|[2021-01-17 16:36:50][DEBUG] : Length: 8
0109|[2021-01-17 16:36:50][DEBUG] : Start decoding packet type 0x10
0110|[2021-01-17 16:36:50][DEBUG] : Subtype = ARC
0111|[2021-01-17 16:36:50][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xC1', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0112|[2021-01-17 16:36:50][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0113|[2021-01-17 16:36:50][DEBUG] : Device is known id : 46
0114|[2021-01-17 16:36:51][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0115|[2021-01-17 16:36:51][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0116|[2021-01-17 16:36:51][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0117|[2021-01-17 16:36:51][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0118|[2021-01-17 16:36:51][DEBUG] : Message: 0b1100c20002475003000070
0119|[2021-01-17 16:36:51][DEBUG] : Decode : 0b1100c20002475003000070
0120|[2021-01-17 16:36:51][DEBUG] : Test message: 0b1100c20002475003000070
0121|[2021-01-17 16:36:51][DEBUG] : PacketType: 0x11
0122|[2021-01-17 16:36:51][DEBUG] : Length: 12
0123|[2021-01-17 16:36:51][DEBUG] : Start decoding packet type 0x11
0124|[2021-01-17 16:36:51][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0125|[2021-01-17 16:36:51][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xC2', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0126|[2021-01-17 16:36:51][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0127|[2021-01-17 16:36:51][DEBUG] : Device is known id : 00024750
0128|[2021-01-17 16:36:51][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0129|[2021-01-17 16:36:51][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0130|[2021-01-17 16:36:51][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0131|[2021-01-17 16:36:51][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0132|[2021-01-17 16:36:52][DEBUG] : Message: 0b1101c30002441003000070
0133|[2021-01-17 16:36:52][DEBUG] : Decode : 0b1101c30002441003000070
0134|[2021-01-17 16:36:52][DEBUG] : Test message: 0b1101c30002441003000070
0135|[2021-01-17 16:36:52][DEBUG] : PacketType: 0x11
0136|[2021-01-17 16:36:52][DEBUG] : Length: 12
0137|[2021-01-17 16:36:52][DEBUG] : Start decoding packet type 0x11
0138|[2021-01-17 16:36:52][DEBUG] : Subtype = HomeEasy EU
0139|[2021-01-17 16:36:52][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xC3', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0140|[2021-01-17 16:36:52][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0141|[2021-01-17 16:36:52][DEBUG] : unknown device id : 00024410
0142|[2021-01-17 16:36:52][DEBUG] : Message: 071001c446050070
0143|[2021-01-17 16:36:52][DEBUG] : Decode : 071001c446050070
0144|[2021-01-17 16:36:52][DEBUG] : Test message: 071001c446050070
0145|[2021-01-17 16:36:52][DEBUG] : PacketType: 0x10
0146|[2021-01-17 16:36:52][DEBUG] : Length: 8
0147|[2021-01-17 16:36:52][DEBUG] : Start decoding packet type 0x10
0148|[2021-01-17 16:36:52][DEBUG] : Subtype = ARC
0149|[2021-01-17 16:36:52][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xC4', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0150|[2021-01-17 16:36:52][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0151|[2021-01-17 16:36:52][DEBUG] : Device is known id : 46
0152|[2021-01-17 16:36:52][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0153|[2021-01-17 16:36:52][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0154|[2021-01-17 16:36:52][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0155|[2021-01-17 16:36:52][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0156|[2021-01-17 16:36:53][DEBUG] : Message: 0b1100c50002475003000070
0157|[2021-01-17 16:36:53][DEBUG] : Decode : 0b1100c50002475003000070
0158|[2021-01-17 16:36:53][DEBUG] : Test message: 0b1100c50002475003000070
0159|[2021-01-17 16:36:53][DEBUG] : PacketType: 0x11
0160|[2021-01-17 16:36:53][DEBUG] : Length: 12
0161|[2021-01-17 16:36:53][DEBUG] : Start decoding packet type 0x11
0162|[2021-01-17 16:36:53][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0163|[2021-01-17 16:36:53][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xC5', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0164|[2021-01-17 16:36:53][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0165|[2021-01-17 16:36:53][DEBUG] : Device is known id : 00024750
0166|[2021-01-17 16:36:53][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0167|[2021-01-17 16:36:53][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0168|[2021-01-17 16:36:53][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0169|[2021-01-17 16:36:53][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0170|[2021-01-17 16:36:53][DEBUG] : Message: 0b1101c60002441003000070
0171|[2021-01-17 16:36:53][DEBUG] : Decode : 0b1101c60002441003000070
0172|[2021-01-17 16:36:53][DEBUG] : Test message: 0b1101c60002441003000070
0173|[2021-01-17 16:36:53][DEBUG] : PacketType: 0x11
0174|[2021-01-17 16:36:53][DEBUG] : Length: 12
0175|[2021-01-17 16:36:53][DEBUG] : Start decoding packet type 0x11
0176|[2021-01-17 16:36:53][DEBUG] : Subtype = HomeEasy EU
0177|[2021-01-17 16:36:53][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xC6', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0178|[2021-01-17 16:36:53][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0179|[2021-01-17 16:36:53][DEBUG] : unknown device id : 00024410
0180|[2021-01-17 16:36:54][DEBUG] : Message: 071001c746050070
0181|[2021-01-17 16:36:54][DEBUG] : Decode : 071001c746050070
0182|[2021-01-17 16:36:54][DEBUG] : Test message: 071001c746050070
0183|[2021-01-17 16:36:54][DEBUG] : PacketType: 0x10
0184|[2021-01-17 16:36:54][DEBUG] : Length: 8
0185|[2021-01-17 16:36:54][DEBUG] : Start decoding packet type 0x10
0186|[2021-01-17 16:36:54][DEBUG] : Subtype = ARC
0187|[2021-01-17 16:36:54][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xC7', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0188|[2021-01-17 16:36:54][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0189|[2021-01-17 16:36:54][DEBUG] : Device is known id : 46
0190|[2021-01-17 16:36:54][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0191|[2021-01-17 16:36:54][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0192|[2021-01-17 16:36:54][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0193|[2021-01-17 16:36:54][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0194|[2021-01-17 16:36:55][DEBUG] : Message: 0b1100c80002475003000070
0195|[2021-01-17 16:36:55][DEBUG] : Decode : 0b1100c80002475003000070
0196|[2021-01-17 16:36:55][DEBUG] : Test message: 0b1100c80002475003000070
0197|[2021-01-17 16:36:55][DEBUG] : PacketType: 0x11
0198|[2021-01-17 16:36:55][DEBUG] : Length: 12
0199|[2021-01-17 16:36:55][DEBUG] : Start decoding packet type 0x11
0200|[2021-01-17 16:36:55][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0201|[2021-01-17 16:36:55][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xC8', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0202|[2021-01-17 16:36:55][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0203|[2021-01-17 16:36:55][DEBUG] : Device is known id : 00024750
0204|[2021-01-17 16:36:55][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0205|[2021-01-17 16:36:55][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0206|[2021-01-17 16:36:55][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0207|[2021-01-17 16:36:55][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0208|[2021-01-17 16:36:55][DEBUG] : Message: 0b1101c90002441003000070
0209|[2021-01-17 16:36:55][DEBUG] : Decode : 0b1101c90002441003000070
0210|[2021-01-17 16:36:55][DEBUG] : Test message: 0b1101c90002441003000070
0211|[2021-01-17 16:36:55][DEBUG] : PacketType: 0x11
0212|[2021-01-17 16:36:55][DEBUG] : Length: 12
0213|[2021-01-17 16:36:55][DEBUG] : Start decoding packet type 0x11
0214|[2021-01-17 16:36:55][DEBUG] : Subtype = HomeEasy EU
0215|[2021-01-17 16:36:55][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xC9', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0216|[2021-01-17 16:36:55][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0217|[2021-01-17 16:36:55][DEBUG] : unknown device id : 00024410
0218|[2021-01-17 16:36:56][DEBUG] : Message: 071001ca46050070
0219|[2021-01-17 16:36:56][DEBUG] : Decode : 071001ca46050070
0220|[2021-01-17 16:36:56][DEBUG] : Test message: 071001ca46050070
0221|[2021-01-17 16:36:56][DEBUG] : PacketType: 0x10
0222|[2021-01-17 16:36:56][DEBUG] : Length: 8
0223|[2021-01-17 16:36:56][DEBUG] : Start decoding packet type 0x10
0224|[2021-01-17 16:36:56][DEBUG] : Subtype = ARC
0225|[2021-01-17 16:36:56][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xCA', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0226|[2021-01-17 16:36:56][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0227|[2021-01-17 16:36:56][DEBUG] : Device is known id : 46
0228|[2021-01-17 16:36:56][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0229|[2021-01-17 16:36:56][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0230|[2021-01-17 16:36:56][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0231|[2021-01-17 16:36:56][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0232|[2021-01-17 16:36:56][DEBUG] : Message: 0b1100cb0002475003000070
0233|[2021-01-17 16:36:56][DEBUG] : Decode : 0b1100cb0002475003000070
0234|[2021-01-17 16:36:56][DEBUG] : Test message: 0b1100cb0002475003000070
0235|[2021-01-17 16:36:56][DEBUG] : PacketType: 0x11
0236|[2021-01-17 16:36:56][DEBUG] : Length: 12
0237|[2021-01-17 16:36:56][DEBUG] : Start decoding packet type 0x11
0238|[2021-01-17 16:36:56][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0239|[2021-01-17 16:36:56][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xCB', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0240|[2021-01-17 16:36:56][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0241|[2021-01-17 16:36:56][DEBUG] : Device is known id : 00024750
0242|[2021-01-17 16:36:57][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0243|[2021-01-17 16:36:57][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0244|[2021-01-17 16:36:57][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0245|[2021-01-17 16:36:57][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0246|[2021-01-17 16:36:57][DEBUG] : Message: 0b1101cc0002441003000070
0247|[2021-01-17 16:36:57][DEBUG] : Decode : 0b1101cc0002441003000070
0248|[2021-01-17 16:36:57][DEBUG] : Test message: 0b1101cc0002441003000070
0249|[2021-01-17 16:36:57][DEBUG] : PacketType: 0x11
0250|[2021-01-17 16:36:57][DEBUG] : Length: 12
0251|[2021-01-17 16:36:57][DEBUG] : Start decoding packet type 0x11
0252|[2021-01-17 16:36:57][DEBUG] : Subtype = HomeEasy EU
0253|[2021-01-17 16:36:57][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x01', 'seqnbr': '0xCC', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x44', 'id4': '0x10', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0254|[2021-01-17 16:36:57][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x01', 'id': '00024410', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0255|[2021-01-17 16:36:57][DEBUG] : unknown device id : 00024410
0256|[2021-01-17 16:36:57][DEBUG] : Message: 071001cd46050070
0257|[2021-01-17 16:36:57][DEBUG] : Decode : 071001cd46050070
0258|[2021-01-17 16:36:57][DEBUG] : Test message: 071001cd46050070
0259|[2021-01-17 16:36:57][DEBUG] : PacketType: 0x10
0260|[2021-01-17 16:36:57][DEBUG] : Length: 8
0261|[2021-01-17 16:36:57][DEBUG] : Start decoding packet type 0x10
0262|[2021-01-17 16:36:57][DEBUG] : Subtype = ARC
0263|[2021-01-17 16:36:57][DEBUG] : Data : {'packetlen': '0x07', 'packettype': '0x10', 'subtype': '0x01', 'seqnbr': '0xCD', 'housecode': '0x46', 'unitcode': 5, 'cmnd': 0, 'filler': 0, 'rssi': 7}
0264|[2021-01-17 16:36:57][DEBUG] : Decoded info : {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}
0265|[2021-01-17 16:36:57][DEBUG] : Device is known id : 46
0266|[2021-01-17 16:36:57][DEBUG] : Send to jeedom : {'devices': {'4610': {'packettype': '0x10', 'subtype': '0x01', 'id': '46', 'unitcode': 5, 'cmnd': 0, 'rssi': 7}}}
0267|[2021-01-17 16:36:57][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0268|[2021-01-17 16:36:57][DEBUG] : {"devices":{"4610":{"packettype":"0x10","subtype":"0x01","id":"46","unitcode":5,"cmnd":0,"rssi":7}}}
0269|[2021-01-17 16:36:57][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0
0270|[2021-01-17 16:36:58][DEBUG] : Message: 0b1100ce0002475003000070
0271|[2021-01-17 16:36:58][DEBUG] : Decode : 0b1100ce0002475003000070
0272|[2021-01-17 16:36:58][DEBUG] : Test message: 0b1100ce0002475003000070
0273|[2021-01-17 16:36:58][DEBUG] : PacketType: 0x11
0274|[2021-01-17 16:36:58][DEBUG] : Length: 12
0275|[2021-01-17 16:36:58][DEBUG] : Start decoding packet type 0x11
0276|[2021-01-17 16:36:58][DEBUG] : Subtype = AC KlikAanKlikUit,HomeEasyUK,Chacon,NEXA,Intertechno
0277|[2021-01-17 16:36:58][DEBUG] : Data : {'packetlen': '0x0B', 'packettype': '0x11', 'subtype': '0x00', 'seqnbr': '0xCE', 'id1': '0x00', 'filler1': '0x00', 'id2': '0x02', 'id3': '0x47', 'id4': '0x50', 'unitcode': 3, 'cmnd': 0, 'level': 0, 'filler2': 0, 'rssi': 7}
0278|[2021-01-17 16:36:58][DEBUG] : Decoded info : {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}
0279|[2021-01-17 16:36:58][DEBUG] : Device is known id : 00024750
0280|[2021-01-17 16:36:58][DEBUG] : Send to jeedom : {'devices': {'0002475011': {'packettype': '0x11', 'subtype': '0x00', 'id': '00024750', 'unitcode': 3, 'cmnd': 0, 'level': 0.0, 'rssi': 7}}}
0281|[2021-01-17 16:36:58][DEBUG] : Starting new HTTP connection (1): 127.0.0.1:80
0282|[2021-01-17 16:36:58][DEBUG] : {"devices":{"0002475011":{"packettype":"0x11","subtype":"0x00","id":"00024750","unitcode":3,"cmnd":0,"level":0,"rssi":7}}}
0283|[2021-01-17 16:36:58][DEBUG] : http://127.0.0.1:80 "POST /plugins/rfxcom/core/php/jeeRfxcom.php?apikey=Bdup1uC9GrOQ5MMQA1ukk5CLYMcs62q2 HTTP/1.1" 200 0

Le mieux avant tout chose c’est de passer sur le RFXmngr (sous windows), pour voir si les 0x5x passent en activant protocoles …

J’ai le mauvais oeil aujourd’hui, en allan sur le site de rfxcom pour faire une mise à jour de
rfxmngr (ma version date de 2015) j’ai eu ça :

Les détecteurs de « virus » et autres « malware » pas toujours fiable sur ce que le site envoie ou récupere comme INFO…
Est ce que tu as RFXmngr ?

une version de 2015 qui démarre en erreur :frowning:

essai avec ça RFXmngrSetup190027 - Copie.exe.txt (1,7 Mo)
Enleve le .txt bien sur !

image