I just checked 2 of my networks. I found multiple devices with a mac address identified as “Shenzhen” something or other. They are an android phone, a wifi connected TV, a TV streaming dongle, and a Dell computer.
I used the tinyipcam android app, which is a very good app to scan the network for cameras. It found one device that it identified as a camera, a cannon printer.
If you have an android phone, I recommend “fing” to scan your network, “ping tools” for a full port scan of any questionable devices, and “tinycam monitor” to scan the network specifically for cameras.
When you find an unknown device connected to your network, it almost certainly isn’t a camera. But you should find it. The Linux tools airodump-ng with airmon-ng part of the airocrack-ng tools, can be used like a radar to tell when your closer or farther from a wifi client to pinpoint a hidden device.
I just checked 2 of my networks. I found multiple devices with a mac address identified as “Shenzhen” something or other. They are an android phone, a wifi connected TV, a TV streaming dongle, and a Dell computer.
I used the tinyipcam android app, which is a very good app to scan the network for cameras. It found one device that it identified as a camera, a cannon printer.
If you have an android phone, I recommend “fing” to scan your network, “ping tools” for a full port scan of any questionable devices, and “tinycam monitor” to scan the network specifically for cameras.
When you find an unknown device connected to your network, it almost certainly isn’t a camera. But you should find it. The Linux tools airodump-ng with airmon-ng part of the airocrack-ng tools, can be used like a radar to tell when your closer or farther from a wifi client to pinpoint a hidden device.