After the already known EULA file.
Source files:
asuswrt-merlin/release/src/router/bwdpi_bin/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp_pptp/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm7/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp_pptp/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm7/wred
CISCO...BW..LS..WG..PHION...NETGEAR.ZYXEL...ANCHIVA.BRCM....ELFIQ...ASUS
nvram get upnp_enable
nvram get ddns_enable_x
nvram get wl0_auth_mode_x
nvram get wl1_auth_mode_x
nvram get wl0_wep_x
nvram get wl1_wep_x
nvram get wl0_key_x
nvram get wl1_key_x
nvram get wl0_key
nvram get wl1_key
nvram get wl0_wpa_psk => 2.4GHZ BAND WIRELESS PASSWORD
nvram get wl1_wpa_psk => 5GHZ BAND WIRELESS PASSWORD
nvram get wl0_radius_key
nvram get wl1_radius_key
nvram get misc_http_x
nvram get misc_ping_x
nvram get http_username => WEBUI/SSH USERNAME
nvram get http_passwd => WEBUI/SSH PASSWORD
nvram get dmz_ip
nvram get autofw_enable_x
nvram get vts_enable_x
nvram get enable_ftp
nvram get st_ftp_mode
nvram get enable_samba
nvram get st_samba_mode
Is this only an internal check on Trendmicro Network Protection? Or its also sent to their servers address listed inside the file "data collect daemon"??
ntd-asus-2014b-en.fbs20.trendmicro.com
rgom10-en.url.trendmicro.com
backup21.url.trendmicro.com
wrs.trendmicro.com
activeupdate.trendmicro.co.jp
gslb1.fbs.trendmicro.com.akadns.net
data_colld: ntd-asus-2014b-en.fbs20.trendmicro.com (ALIAS) slb1.fbs.trendmicro.com.akadns.net
wred: rgom10-en.url.trendmicro.com (ALIAS) trendmicro.com.edgesuite.net
wred: backup21.url.trendmicro.com (ALIAS) trendmicro-g.georedirector.akadns.net
wred: wrs.trendmicro.com
wred: activeupdate.trendmicro.co.jp
Something that would worth some time to investigate.
Source files:
asuswrt-merlin/release/src/router/bwdpi_bin/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp_pptp/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm7/datacolld
asuswrt-merlin/release/src/router/bwdpi_bin/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm6_smp_pptp/wred
asuswrt-merlin/release/src/router/bwdpi_bin/bwdpi_bcm7/wred
CISCO...BW..LS..WG..PHION...NETGEAR.ZYXEL...ANCHIVA.BRCM....ELFIQ...ASUS
nvram get upnp_enable
nvram get ddns_enable_x
nvram get wl0_auth_mode_x
nvram get wl1_auth_mode_x
nvram get wl0_wep_x
nvram get wl1_wep_x
nvram get wl0_key_x
nvram get wl1_key_x
nvram get wl0_key
nvram get wl1_key
nvram get wl0_wpa_psk => 2.4GHZ BAND WIRELESS PASSWORD
nvram get wl1_wpa_psk => 5GHZ BAND WIRELESS PASSWORD
nvram get wl0_radius_key
nvram get wl1_radius_key
nvram get misc_http_x
nvram get misc_ping_x
nvram get http_username => WEBUI/SSH USERNAME
nvram get http_passwd => WEBUI/SSH PASSWORD
nvram get dmz_ip
nvram get autofw_enable_x
nvram get vts_enable_x
nvram get enable_ftp
nvram get st_ftp_mode
nvram get enable_samba
nvram get st_samba_mode
Is this only an internal check on Trendmicro Network Protection? Or its also sent to their servers address listed inside the file "data collect daemon"??
ntd-asus-2014b-en.fbs20.trendmicro.com
rgom10-en.url.trendmicro.com
backup21.url.trendmicro.com
wrs.trendmicro.com
activeupdate.trendmicro.co.jp
gslb1.fbs.trendmicro.com.akadns.net
data_colld: ntd-asus-2014b-en.fbs20.trendmicro.com (ALIAS) slb1.fbs.trendmicro.com.akadns.net
wred: rgom10-en.url.trendmicro.com (ALIAS) trendmicro.com.edgesuite.net
wred: backup21.url.trendmicro.com (ALIAS) trendmicro-g.georedirector.akadns.net
wred: wrs.trendmicro.com
wred: activeupdate.trendmicro.co.jp
Something that would worth some time to investigate.
Last edited: