Adups? Do we need to worry? - LeEco Le Pro3 Questions & Answers

There was a big news about spyware pre-installed on some Android phones from China so is LePro one of them?
The spyware has the capability to collect IMEI data, SMS logs and contents, call logs, contact names, and IP addresses, then send the data back to third party servers in China without notification or permission from users. Said data was collected and encrypted every 24 to 72 hours in the testing phase, then transmitted to two specific IP addresses owned by Adups.
Any thought? Can someone verify that we don't have this pre-installed in our phone?

I think not, on my x720 I have no process " com.adups.fota and com.adups.fota.sysoper"

meuhmeuh51 said:
I think not, on my x720 I have no process " com.adups.fota and com.adups.fota.sysoper"
Click to expand...
Click to collapse
That was a relief, thank you.

I have removed/disabled of the LeEco tools and do not use any of them.
Additionally I also added all *.letv.com I found in logcat to the hosts file. If you want you can add this, to prevent that the phone sends anything to letv.com servers.
Code:
# Prevent connections to all kind of LeTv servers:
127.0.0.1 account.letv.com
127.0.0.1 accounts.scloud.letv.com
127.0.0.1 agnes.www.letv.com
127.0.0.1 api.hdtv.letv.com
127.0.0.1 api.itv.letv.com
127.0.0.1 api.zhifu.letv.com
127.0.0.1 apizhifu.letv.com
127.0.0.1 backup.scloud.letv.com
127.0.0.1 browser.letv.com
127.0.0.1 browser.scloud.letv.com
127.0.0.1 calendar.letv.com
127.0.0.1 calendar.scloud.letv.com
127.0.0.1 cloud.le.com
127.0.0.1 control.letv.com
127.0.0.1 control.scloud.letv.com
127.0.0.1 custom.scloud.letv.com
127.0.0.1 device.letv.com
127.0.0.1 device.scloud.letv.com
127.0.0.1 diff.scloud.letv.com
127.0.0.1 dlb2.g5.letvlb.com
127.0.0.1 dnm-cn.scloud.letv.com
127.0.0.1 dnm.scloud.letv.com
127.0.0.1 emoticon.scloud.letv.com
127.0.0.1 frame.scloud.letv.com
127.0.0.1 image.scloud.letv.com
127.0.0.1 itv.letv.com
127.0.0.1 itv.letv.com.wscdns.com
127.0.0.1 letv.xdwscache.ourwebcdn.com
127.0.0.1 levip.scloud.letv.com
127.0.0.1 lock.letv.com
127.0.0.1 lock.scloud.letv.com
127.0.0.1 mail.scloud.letv.com
127.0.0.1 music.letv.com
127.0.0.1 music.letv.com.cdn20.com
127.0.0.1 music.scloud.letv.com
127.0.0.1 note.scloud.letv.com
127.0.0.1 pan.scloud.letv.com
127.0.0.1 pay.leletv.net
127.0.0.1 pay.letv.com
127.0.0.1 photo.scloud.letv.com
127.0.0.1 push.letv.com
127.0.0.1 push.scloud.letv.com
127.0.0.1 remote.letv.com
127.0.0.1 remote.scloud.letv.com
127.0.0.1 s3.lecloud.com
127.0.0.1 s3proxy.scloud.letv.com
127.0.0.1 share.scloud.letv.com
127.0.0.1 sticker.scloud.letv.com
127.0.0.1 sync.letv.com
127.0.0.1 sync.scloud.letv.com
127.0.0.1 theme.scloud.letv.com
127.0.0.1 usercenter.letv.com
127.0.0.1 usercenter.scloud.letv.com
127.0.0.1 vcall-scloud.cp21.ott.cibntv.net
127.0.0.1 voice.go.letv.com
127.0.0.1 wallet.scloud.letv.com
127.0.0.1 wallpaper.letv.com
127.0.0.1 wallpaper.scloud.letv.com
127.0.0.1 xfeedback.letv.com
127.0.0.1 xfeedback.scloud.letv.com
127.0.0.1 xpage.letv.com
127.0.0.1 xpage.scloud.letv.com
127.0.0.1 xsquare.letv.com
127.0.0.1 xsquare.scloud.letv.com
127.0.0.1 yuanxian.letv.com
127.0.0.1 yuanxianletv.letvlb.com
127.0.0.1 zhifu.letv.com
# maybe you want to remove these 2 to be able to receive OTA updates:
127.0.0.1 ota.letv.com
127.0.0.1 ota.scloud.letv.com
If you know any more server names, please let me know.

Thanks for sharing the tips.
Mind elaborating the name of host file? How to add all of the list to it? One by one or just *. letv . com?
androcheck said:
I have removed/disabled of the LeEco tools and do not use any of them.
.....
If you know any more server names, please let me know.
Click to expand...
Click to collapse

Related

isdn > linux-pbx > SIP > BT-Bridge > XDA2

Hi,
today i received my first ISDN call on my MDA2
- get you ISDN-Card working under Linux
- install asterisk
- install bluez
- install brctr
- BluetoothGPS.cab
- install X-Lite on the XDA2
Code:
/etc/asterisk/modem.conf
[interfaces]
context=remote
driver=i4l
stripmsd=1
dialtype=tone
mode=immediate
msn=YourMSN
device => /dev/ttyI5
/etc/asterisk/sip.conf
[general]
[olli]
type=friend
username=olli
host=dynamic
canreinvite=no
add somthing like:
exten => 500,2,Dial(SIP/olli)
[from-sip]
exten => olli,1,Dial(SIP/olli)
exten => olli,2,Hangup
in the /etc/asterisk/extensions.conf
Give the XDA a static IP and connect to the
Bluez(0) Network Accesspoint.
Than configure the BT-Bridge:
Code:
modprobe usb-uhci
modprobe uhci
modprobe usbcore
mount /proc/bus/usb/
modprobe bluez
modprobe l2cap
modprobe bnep
modprobe sco
modprobe rfcomm
modprobe hci_usb
hcid
sdpd
pand -s -r NAP -M
ifconfig eth0 down
ifconfig eth0 0.0.0.0
ifconfig bnep0 0.0.0.0
brctl addbr pan0
ifconfig pan0 192.168.1.19
brctl addif pan0 eth0
brctl addif pan0 bnep0
route del default
route add default gw 192.168.1.1 dev pan0
brctl showmacs pan0
ping the XDA.
Install X-lite
configure:
user: olli (see sip.conf)
sip-proxy: IP of the astrisk server
mark sent internal IP
Now your can receive IP and PSTN calls.
PSTN by dialing your MSN+500 from any phone.
Has anybody an idea how to configure asterisk
to forward SIP-Calls from the xda to PSTN ?
bye Olli
The XDA a static IP and connect to the
Bluez Network Accesspoint. how is the other?
_________________
Ip pbx

[How to] Change DNS server on Android phones

Domain Name System / Server is the one which takes care of translating the human readable domain names into machine understandable IP addresses. If you are not able to access a particular set of websites either from your laptop /phone, DNS server could be a reason for it. To fix the problem, one has to change the network configurations to use some of the popular DNS servers like Open DNS or Google’s public DNS. On Android phones, changing the DNS server is easy if you are using the static IP. You can do it from Settings > Wireless & network settings > Wi-Fi settings > Advanced (from menu) > check the ‘Use static IP’ option. After that, you will be able to change the DNS servers. However, when you are using dynamic IP (which will be the case most likely), the process is not straight forward. DNS server details will be taken from the DHCP server which assigns the IP.
Here are the steps to be followed to change the (WIFI Connection) DNS servers:
- Android system chooses the DNS servers using the script located at “/system/etc/dhcpcd/dhcpcd-hooks/20-dns.conf”
- By default, /system partition is mounted as read-only. Need to re-mount the same in re-write mode.
- Take a backup of the script. Download the modified version of the script from here (http://varun-scratchpad.googlecode.com/svn/trunk/static/20-dns.conf). The modified script has two additional lines which will override the DNS server changes. The modified script uses the Google’s public DNS.
- Changes will be applied after restarting the connection /device.
3G Connection:
- Download the wrapper script from here (http://varun-scratchpad.googlecode.com/svn/trunk/static/change-dns.sh) This wraps all the commands needed for changing the DNS server in a shell script.
- Download and install an interpreter for executing your shell script from your phone (e.s. scripter from Rom Toolbox)
- Launch the script. Grant the Super permission when asked.
- You just have to run this script whenever you are connecting to your mobile network.
Done. You settings are proper by visiting http://welcome.opendns.com. Remember, the settings will be applicable only for the current session.
By: http://blog.varunkumar.me/2010/09/how-to-change-dns-server-on-android.html?m=1
Or use Set DNS from Market
lol.. I cover my head with ashes!!!
I didn't know about these apps... I apologize!!!
uffapple said:
lol.. I cover my head with ashes!!!
I didn't know about these apps... I apologize!!!
Click to expand...
Click to collapse
your work isn't useless.. it tell me how it work.. thanks
Help
Help, after i did this i can't connect to Wi-Fi anymore. I copied the old 20-dns file and nothing u_u. Pls help
Override DNS for KitKat
uffapple said:
Domain Name System / Server is the one which takes care of translating the human readable domain names into machine understandable IP addresses. If you are not able to access a particular set of websites either from your laptop /phone, DNS server could be a reason for it. To fix the problem, one has to change the network configurations to use some of the popular DNS servers like Open DNS or Google’s public DNS. On Android phones, changing the DNS server is easy if you are using the static IP. You can do it from Settings > Wireless & network settings > Wi-Fi settings > Advanced (from menu) > check the ‘Use static IP’ option. After that, you will be able to change the DNS servers. However, when you are using dynamic IP (which will be the case most likely), the process is not straight forward. DNS server details will be taken from the DHCP server which assigns the IP.
Here are the steps to be followed to change the (WIFI Connection) DNS servers:
- Android system chooses the DNS servers using the script located at “/system/etc/dhcpcd/dhcpcd-hooks/20-dns.conf”
- By default, /system partition is mounted as read-only. Need to re-mount the same in re-write mode.
- Take a backup of the script. Download the modified version of the script from here (http://varun-scratchpad.googlecode.com/svn/trunk/static/20-dns.conf). The modified script has two additional lines which will override the DNS server changes. The modified script uses the Google’s public DNS.
- Changes will be applied after restarting the connection /device.
3G Connection:
- Download the wrapper script from here (http://varun-scratchpad.googlecode.com/svn/trunk/static/change-dns.sh) This wraps all the commands needed for changing the DNS server in a shell script.
- Download and install an interpreter for executing your shell script from your phone (e.s. scripter from Rom Toolbox)
- Launch the script. Grant the Super permission when asked.
- You just have to run this script whenever you are connecting to your mobile network.
Done. You settings are proper by visiting http://welcome.opendns.com. Remember, the settings will be applicable only for the current session.
By: http://blog.varunkumar.me/2010/09/how-to-change-dns-server-on-android.html?m=1
Click to expand...
Click to collapse
Thank you for sharing, but I have to say that the "setprop" method does not work on KitKat (I'm talking about mobile connections).
I wrote an app called "Override DNS for KitKat" to solve this issue. It's on the Play Store.
There's a much more reliable and easier method. Just use this as AFWall custom script or use manually in init.d (replace '$IPTABLES' with 'iptables' and just use the last 2 lines).
Code:
$IPTABLES -t nat -D OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -D OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -I OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53
$IPTABLES -t nat -I OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53
DualJoe said:
There's a much more reliable and easier method. Just use this as AFWall custom script or use manually in init.d (replace '$IPTABLES' with 'iptables' and just use the last 2 lines).
Code:
$IPTABLES -t nat -D OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -D OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -I OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53
$IPTABLES -t nat -I OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53
Click to expand...
Click to collapse
The "iptables" commands also works good on my Nexus 4 and Slimkat, thank you!

[Q] USB Ethernet problem with Lollipop (GT-I9506)

Hi,
I'm trying to run my USB Ethernet dongle with my S4 LTE+ Lollipop D6, but aplications in the phone and other computers on the network didn't see that connection.
My tryings:
[email protected]:/ # netcfg eth0 up
[email protected]:/ # netcfg eth0 dhcp
[email protected]:/ # netcfg|grep eth0
eth0 UP 10.0.0.12/24 0x00001043 f0:25:b7:20:af:75
[email protected]:/ # ping 10.0.0.1
PING 10.0.0.1 (10.0.0.1) 56(84) bytes of data.
64 bytes from 10.0.0.1: icmp_seq=1 ttl=64 time=1.96 ms
64 bytes from 10.0.0.1: icmp_seq=2 ttl=64 time=2.05 ms
64 bytes from 10.0.0.1: icmp_seq=3 ttl=64 time=1.87 ms
[email protected]:/ # ping www.google.com
ping: unknown host www.google.com
2|[email protected]:/ # nslookup www.google.com
Server: 8.8.4.4
Address 1: 8.8.4.4 google-public-dns-b.google.com
Name: www.google.com
Address 1: 2a00:1450:4013:c01::93 ea-in-x93.1e100.net
Address 2: 74.125.136.104 ea-in-f104.1e100.net
Address 3: 74.125.136.103 ea-in-f103.1e100.net
Address 4: 74.125.136.99 ea-in-f99.1e100.net
Address 5: 74.125.136.105 ea-in-f105.1e100.net
Address 6: 74.125.136.147 ea-in-f147.
I've found this but it doesn't work also:
ndc network create 100
ndc network interface add 100 eth0
ndc network route add 100 eth0 <GATEWAY>/24
ndc network route add 100 eth0 0.0.0.0/0 <DNS1> <DNS2>
ndc resolver setnetdns 100 localdomain <DNS1> <DNS2>
ndc network default set 100
Any suggestions?
Thx
No body knows?
Hi
Have you tried this:
For Lollipop:
ndc resolver setnetdns eth0 "" 8.8.8.8 8.8.4.4​For Kitkat:
ndc resolver setifdns eth0 "" 8.8.8.8 8.8.4.4
ndc resolver setdefaultif eth0​Works for me on 5.1.1 (was able to ping 8.8.8.8 and 8.8.4.4 but not google.com. after typing this in the terminal, the ping worked !)

AdAway - blocking MIUI from calling back home

Most of us don't use Xiaomi phones because of their "superior "software packages, like Mi Cloud, Mi Account, Find, or whatnot. We buy their phones because we get excellent hardware for an affordable price.
So, I decided to snoop around the system and weed out all the domains MIUI uses to report back home to it's chinese overlords. No doubs it sends back a basket of yummy "private user info" gifts
Here is a list of the domains I found about:
# This hosts file contains exported entries from AdAway.
127.0.0.1 market.xiaomi.com
127.0.0.1 api.ad.xiaomi.com
127.0.0.1 notice.game.xiaomi.com
127.0.0.1 api.miui.security.xiaomi.com
127.0.0.1 wifiapi.micloud.xiaomi.net
127.0.0.1 miui.com
127.0.0.1 pdc.micloud.xiaomi.net
127.0.0.1 game.xiaomi.com
127.0.0.1 micloud.xiaomi.net
127.0.0.1 sec-cdn.static.xiaomi.net
127.0.0.1 app.chat.xiaomi.net
127.0.0.1 xiaomi.net
127.0.0.1 xiaomi.com
127.0.0.1 contactapi.micloud.xiaomi.net
127.0.0.1 data.mistat.xiaomi.com
127.0.0.1 api.vip.miui.com
127.0.0.1 connect.rom.miui.com
127.0.0.1 app.market.xiaomi.com
127.0.0.1 account.xiaomi.com
127.0.0.1 miui.net
127.0.0.1 api.account.xiaomi.com
If anyone has any more domains to add, feel free to mention them in your reply.
HOW TO USE:
Root, install AdAway, and add the domains listed above to "Your lists" section in AdAway. See the screenshot for clarification.
Interesting, good job!
No problem. Glad I helped out. Feel free to add more domains to the list, if you know any.
we add that to adaway hosts?
thank you
Do it will block milog too? I always found some logcat in MIUI folder.
If i know how yo disable that logs, tell me...
If I don't mind..... what should we do with this...???
Sry I don't know anything about it...(ofcourse am rooted)
Info on how to block the domains added to the first post.
D-dy said:
Do it will block milog too? I always found some logcat in MIUI folder.
If i know how yo disable that logs, tell me...
Click to expand...
Click to collapse
I solved some of the logcat spam by editing the build.prop file and replacing this:
persist.sys.ssr.enable_ramdumps=1
with this:
persist.sys.ssr.enable_ramdumps=0
Here is an updated list of domains to be blocked:
# This hosts file contains exported entries from AdAway.
127.0.0.1 ad.xiaomi.com
127.0.0.1 game.xiaomi.com
127.0.0.1 pdc.micloud.xiaomi.net
127.0.0.1 223.202.68.86
127.0.0.1 notice.game.xiaomi.com
127.0.0.1 app.chat.xiaomi.net
127.0.0.1 api.miui.security.xiaomi.com
127.0.0.1 api.vip.miui.com
127.0.0.1 contactapi.micloud.xiaomi.net
127.0.0.1 api.ad.xiaomi.com
127.0.0.1 miui.com
127.0.0.1 220.181.47.186
127.0.0.1 sec-cdn.static.xiaomi.net
127.0.0.1 data.mistat.xiaomi.com
127.0.0.1 xiaomi.com
127.0.0.1 micloud.xiaomi.net
127.0.0.1 42.62.94.93
127.0.0.1 resolver.gslb.mi-idc.com
127.0.0.1 account.xiaomi.com
127.0.0.1 chinaunicom.com
127.0.0.1 app.market.xiaomi.com
127.0.0.1 42.62.94.127
127.0.0.1 xiaomi.net
127.0.0.1 api.account.xiaomi.com
127.0.0.1 wifiapi.micloud.xiaomi.net
127.0.0.1 42.62.94.152
127.0.0.1 114.54.23.44
127.0.0.1 connect.rom.miui.com
127.0.0.1 120.134.33.89
127.0.0.1 sdkconfig.ad.xiaomi.com
127.0.0.1 223.202.68.93
127.0.0.1 market.xiaomi.com
127.0.0.1 114.54.23.8
127.0.0.1 miui.net
127.0.0.1 114.54.23.5
Tomo123 said:
Here is an updated list of domains to be blocked:
# This hosts file contains exported entries from AdAway.
127.0.0.1 ad.xiaomi.com
127.0.0.1 game.xiaomi.com
127.0.0.1 pdc.micloud.xiaomi.net
127.0.0.1 223.202.68.86
127.0.0.1 notice.game.xiaomi.com
127.0.0.1 app.chat.xiaomi.net
127.0.0.1 api.miui.security.xiaomi.com
127.0.0.1 api.vip.miui.com
127.0.0.1 contactapi.micloud.xiaomi.net
127.0.0.1 api.ad.xiaomi.com
127.0.0.1 miui.com
127.0.0.1 220.181.47.186
127.0.0.1 sec-cdn.static.xiaomi.net
127.0.0.1 data.mistat.xiaomi.com
127.0.0.1 xiaomi.com
127.0.0.1 micloud.xiaomi.net
127.0.0.1 42.62.94.93
127.0.0.1 resolver.gslb.mi-idc.com
127.0.0.1 account.xiaomi.com
127.0.0.1 chinaunicom.com
127.0.0.1 app.market.xiaomi.com
127.0.0.1 42.62.94.127
127.0.0.1 xiaomi.net
127.0.0.1 api.account.xiaomi.com
127.0.0.1 wifiapi.micloud.xiaomi.net
127.0.0.1 42.62.94.152
127.0.0.1 114.54.23.44
127.0.0.1 connect.rom.miui.com
127.0.0.1 120.134.33.89
127.0.0.1 sdkconfig.ad.xiaomi.com
127.0.0.1 223.202.68.93
127.0.0.1 market.xiaomi.com
127.0.0.1 114.54.23.8
127.0.0.1 miui.net
127.0.0.1 114.54.23.5
Click to expand...
Click to collapse
can u export that list so that we easy can just import ? it is easier .. thanks
I don't think ip redirection is possible in any app, only dns names, other than that, thanks
here's a more thorough list:
Code:
0.0.0.0 a.stat.xiaomi.com
0.0.0.0 abtest.mistat.intl.xiaomi.com
0.0.0.0 abtest.mistat.xiaomi.com
0.0.0.0 ad.mi.com
0.0.0.0 ad.xiaomi.com
0.0.0.0 ad1.xiaomi.com
0.0.0.0 adv.sec.miui.com
0.0.0.0 api.account.xiaomi.com
0.0.0.0 api.ad.xiaomi.com
0.0.0.0 api.admob.xiaomi.com
0.0.0.0 api.chat.xiaomi.net
0.0.0.0 api.comm.miui.com
0.0.0.0 api.cupid.ptqy.gitv.tv
0.0.0.0 api.d.xiaomi.com
0.0.0.0 api.device.xiaomi.net
0.0.0.0 api.io.mi.com
0.0.0.0 api.micloud.xiaomi.net
0.0.0.0 api.miui.security.xiaomi.com
0.0.0.0 api.sec.miui.com
0.0.0.0 api.vip.miui.com
0.0.0.0 api.xiaomi.com
0.0.0.0 api.xmpush.xiaomi.com
0.0.0.0 app.chat.xiaomi.net
0.0.0.0 app.migc.xiaomi.com
0.0.0.0 appstore.cdn.pandora.xiaomi.com
0.0.0.0 appstore.pandora.xiaomi.com
0.0.0.0 assistant.pandora.xiaomi.com
0.0.0.0 auth.be.sec.miui.com
0.0.0.0 awsusor0-cdn.fds-ssl.api.xiaomi.com
0.0.0.0 b.netcheck.gallery.pandora.xiaomi.com
0.0.0.0 bbs.game.xiaomi.com
0.0.0.0 be01.hh.xiaomi.com
0.0.0.0 bgp.fe01.c3.xiaomi.com
0.0.0.0 bk01.hh.xiaomi.com
0.0.0.0 blog.xiaomi.com
0.0.0.0 bss.pandora.xiaomi.com
0.0.0.0 c.id.mi.com
0.0.0.0 cc.sys.intl.xiaomi.com
0.0.0.0 cc.sys.miui.com
0.0.0.0 ccc.sys.intl.xiaomi.com
0.0.0.0 ccc.sys.miui.com
0.0.0.0 cdn.ad.xiaomi.com
0.0.0.0 cdn.fds-ssl.api.xiaomi.com
0.0.0.0 clock.ad.xiaomi.com
0.0.0.0 cnc.fe01.lg.xiaomi.com
0.0.0.0 config.kuyun.com
0.0.0.0 connect.rom.miui.com
0.0.0.0 contactapi.micloud.xiaomi.net
0.0.0.0 ctc.fe01.c3.xiaomi.com
0.0.0.0 ctc.fe02.c3.xiaomi.com
0.0.0.0 d.xiaomi.com
0.0.0.0 data.game.xiaomi.com
0.0.0.0 data.mistat.intl.xiaomi.com
0.0.0.0 data.mistat.xiaomi.com
0.0.0.0 data.sec.miui.com
0.0.0.0 de.pandora.xiaomi.com
0.0.0.0 dvb.pandora.xiaomi.com
0.0.0.0 e.ad.xiaomi.com
0.0.0.0 f1.g.mi.com
0.0.0.0 fcanr.tracking.miui.com
0.0.0.0 fe02.lg.xiaomi.com
0.0.0.0 fe05.lg.xiaomi.com
0.0.0.0 file.market.xiaomi.com
0.0.0.0 file.xmpush.xiaomi.com
0.0.0.0 gallery.cdn.pandora.xiaomi.com
0.0.0.0 gallery.pandora.xiaomi.com
0.0.0.0 game.xiaomi.com
0.0.0.0 geofence.sys.miui.com
0.0.0.0 global.search.xiaomi.net
0.0.0.0 globalapi.ad.xiaomi.com
0.0.0.0 gvod.aiseejapp.atianqi.com
0.0.0.0 hd.xiaomi.com
0.0.0.0 hd02.lg.xiaomi.com
0.0.0.0 heyue.xiaomi.com
0.0.0.0 hk.mibi.xiaomi.com
0.0.0.0 huodong.xiaomi.com
0.0.0.0 huosai.xiaomi.com
0.0.0.0 i.xiaomi.com
0.0.0.0 igame.xiaomi.com
0.0.0.0 image.pandora.xiaomi.com
0.0.0.0 ime.api.xiaomi.com
0.0.0.0 imgg.traffic-media.co
0.0.0.0 iosdl.game.xiaomi.com
0.0.0.0 jellyfish.pandora.xiaomi.com
0.0.0.0 lbs.pandora.xiaomi.com
0.0.0.0 lg-bgp.pandora.xiaomi.com
0.0.0.0 login.game.xiaomi.com
0.0.0.0 logonext.tv.kuyun.com
0.0.0.0 logupdate.avlyun.sec.miui.com
0.0.0.0 m.bss.pandora.xiaomi.com
0.0.0.0 mazu.sec.miui.com
0.0.0.0 meihua.xiaomi.com
0.0.0.0 metok.sys.miui.com
0.0.0.0 mibi.api.xiaomi.com
0.0.0.0 mibi.xiaomi.com
0.0.0.0 micardapi.micloud.xiaomi.net
0.0.0.0 milink.pandora.xiaomi.com
0.0.0.0 mis.migc.xiaomi.com
0.0.0.0 mishop.cdn.pandora.xiaomi.com
0.0.0.0 mishop.pandora.xiaomi.com
0.0.0.0 mitunes.game.xiaomi.com
0.0.0.0 mp.huangye.miui.com
0.0.0.0 new.api.ad.xiaomi.com
0.0.0.0 notice.game.xiaomi.com
0.0.0.0 o2o.api.xiaomi.com
0.0.0.0 order.music.xiaomi.com
0.0.0.0 pdc.micloud.xiaomi.net
0.0.0.0 phonecallapi.micloud.xiaomi.net
0.0.0.0 pmall.migc.xiaomi.com
0.0.0.0 ppurifier.game.xiaomi.com
0.0.0.0 ptmi.gitv.pandora.xiaomi.com
0.0.0.0 qiye.xiaomi.com
0.0.0.0 r.browser.miui.com
0.0.0.0 r.sg.sec.miui.com
0.0.0.0 register.xmpush.xiaomi.com
0.0.0.0 resolver.gslb.mi-idc.com
0.0.0.0 resolver.msg.xiaomi.net
0.0.0.0 sandbox.xmpush.xiaomi.com
0.0.0.0 sdkconfig.ad.intl.xiaomi.com
0.0.0.0 sdkconfig.ad.xiaomi.com
0.0.0.0 secode2.hd.xiaomi.com
0.0.0.0 sfsapi.micloud.xiaomi.net
0.0.0.0 sgpac.account.xiaomi.com
0.0.0.0 shenghuo.xiaomi.com
0.0.0.0 shoes.app-xae.xiaomi.com
0.0.0.0 ssp.ad.xiaomi.com
0.0.0.0 staging.ai.api.xiaomi.com
0.0.0.0 starfish.pandora.xiaomi.com
0.0.0.0 stat.pandora.xiaomi.com
0.0.0.0 static.game.xiaomi.com
0.0.0.0 static.mibi.xiaomi.com
0.0.0.0 statusapi.micloud.xiaomi.net
0.0.0.0 storeconfig.mistat.intl.xiaomi.com
0.0.0.0 t1.g.mi.com
0.0.0.0 tc.hd.xiaomi.com
0.0.0.0 tel.fe01.hh.xiaomi.com
0.0.0.0 test.ad.xiaomi.com
0.0.0.0 test.e.ad.xiaomi.com
0.0.0.0 test.new.api.ad.xiaomi.com
0.0.0.0 tracking.miui.com
0.0.0.0 trial.api.huangye.miui.com
0.0.0.0 tv.app.migc.xiaomi.com
0.0.0.0 update.avlyun.sec.miui.com
0.0.0.0 update.miui.com
0.0.0.0 upgrade.mishop.pandora.xiaomi.com
0.0.0.0 userid.xiaomi.com
0.0.0.0 voip.game.xiaomi.com
0.0.0.0 wallpaper.cdn.pandora.xiaomi.com
0.0.0.0 wallpaper.pandora.xiaomi.com
0.0.0.0 wap.game.xiaomi.com
0.0.0.0 weather.pandora.xiaomi.com
0.0.0.0 xiazai.xiaomi.com
0.0.0.0 xitong.xiaomi.com
0.0.0.0 xlmc.sec.miui.com
0.0.0.0 xshare.api.xiaomi.com
0.0.0.0 zeus.ad.intl.xiaomi.com
0.0.0.0 zx.game.xiaomi.com
One more list:
https://gist.github.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c
adaway blocking me tho to access youtube app. just add to whitelist then problem solved
Great idea to start a list here on xda! I took your through list and added it to my adaway. I pasted into a .txt and uploaded it to the internet then added it as a source in Adaway.
I see the git hub link too, I might update my source. Thank you.
One thing has been bugging me is no third party themes on miui 10! So I'm hoping a redirect to an xml with a valid true is needed. Has anyone spoofed the themes auth server?
More:
Code:
0.0.0.0 fr.app.chat.global.xiaomi.net
0.0.0.0 resolver.msg.global.xiaomi.net
0.0.0.0 relocationapi.micloud.xiaomi.net
0.0.0.0 api.en.miui.com
0.0.0.0 feedback.intl.miui.com
0.0.0.0 us.statusapi.micloud.xiaomi.net
0.0.0.0 i.mi.com
0.0.0.0 global.market.xiaomi.com
0.0.0.0 find.api.micloud.xiaomi.net
0.0.0.0 us.find.api.micloud.xiaomi.net
0.0.0.0 controller.intl.xiaomi.com
0.0.0.0 api.ad.intl.xiaomi.com
0.0.0.0 authbe.sec.intl.miui.com
0.0.0.0 video.intl.xiaomi.com
0.0.0.0 metok-ccc.intl.xiaomi.com
0.0.0.0 weatherapi.market.xiaomi.com
0.0.0.0 us.galleryapi.micloud.xiaomi.net
0.0.0.0 api.sec.intl.miui.com
0.0.0.0 api.developer.xiaomi.com
0.0.0.0 www.miui.com
0.0.0.0 api.hybrid.intl.xiaomi.com
0.0.0.0 tracking.intl.miui.com
0.0.0.0 adv.sec.intl.miui.com
0.0.0.0 fr-app-chat-global-xiaomi-net-1516654448.eu-central-1.elb.amazonaws.com
0.0.0.0 mcc.intl.inf.miui.com
https://github.com/Sunybyjava/KillADHosts/blob/master/Hosts_Miui
Does the Mi Account still works with these in hosts file?
ne0t said:
Does the Mi Account still works with these in hosts file?
Click to expand...
Click to collapse
Hi!
I dont know, i disabled the MiAccount after successful bootloader opening. May you must try it, if it works or not, let us to know. Thank you.
Updated List
Thanks to all for the contributions... I found few more host names from internet and included all in one file with duplicates removed.
Also addressed to 0.0.0. in place of 127.0.0.1 as that seems to be better.
PS: Not yet tested
Code:
0.0.0.0 10.235.124.13
0.0.0.0 10.99.168.145
0.0.0.0 10.99.184.96
0.0.0.0 a.stat.xiaomi.com
0.0.0.0 abtest.mistat.intl.xiaomi.com
0.0.0.0 abtest.mistat.xiaomi.com
0.0.0.0 account.jetbrains.com
0.0.0.0 account.preview.n.xiaomi.net
0.0.0.0 account.xiaomi.com
0.0.0.0 ad.mi.com
0.0.0.0 ad.xiaomi.com
0.0.0.0 ad1.xiaomi.com
0.0.0.0 adinfo.ra1.xlmc.sec.miui.com
0.0.0.0 adv.sec.intl.miui.com
0.0.0.0 adv.sec.miui.com
0.0.0.0 api.account.preview.n.xiaomi.net
0.0.0.0 api.account.xiaomi.com
0.0.0.0 api.ad.intl.xiaomi.com
0.0.0.0 api.ad.xiaomi.com
0.0.0.0 api.admob.xiaomi.com
0.0.0.0 api.chat.xiaomi.net
0.0.0.0 api.comm.miui.com
0.0.0.0 api.cupid.ptqy.gitv.tv
0.0.0.0 api.d.xiaomi.com
0.0.0.0 api.developer.xiaomi.com
0.0.0.0 api.device.xiaomi.net
0.0.0.0 api.en.miui.com
0.0.0.0 api.hybrid.intl.xiaomi.com
0.0.0.0 api.hybrid.xiaomi.com
0.0.0.0 api.io.mi.com
0.0.0.0 api.micloud.xiaomi.net
0.0.0.0 api.miui.security.xiaomi.com
0.0.0.0 api.ra2.xlmc.sec.miui.com
0.0.0.0 api.sec.intl.miui.com
0.0.0.0 api.sec.miui.com
0.0.0.0 api.setting.intl.miui.com
0.0.0.0 api.tw06.xlmc.sec.miui.com
0.0.0.0 api.vip.miui.com
0.0.0.0 api.xiaomi.com
0.0.0.0 api.xmpush.xiaomi.com
0.0.0.0 api.zhuti.xiaomi.com
0.0.0.0 app.chat.xiaomi.net
0.0.0.0 app.market.xiaomi.com
0.0.0.0 app.mibi.xiaomi.com
0.0.0.0 app.migc.xiaomi.com
0.0.0.0 app.xiaomi.com
0.0.0.0 app01.nodes.gslb.mi-idc.com
0.0.0.0 app02.nodes.gslb.mi-idc.com
0.0.0.0 appstore.cdn.pandora.xiaomi.com
0.0.0.0 appstore.pandora.xiaomi.com
0.0.0.0 assistant.pandora.xiaomi.com
0.0.0.0 auth.be.sec.miui.com
0.0.0.0 authbe.sec.intl.miui.com
0.0.0.0 awsusor0-cdn.fds-ssl.api.xiaomi.com
0.0.0.0 b.netcheck.gallery.pandora.xiaomi.com
0.0.0.0 bbs.game.xiaomi.com
0.0.0.0 be01.hh.xiaomi.com
0.0.0.0 bgp.fe01.c3.xiaomi.com
0.0.0.0 bk01.hh.xiaomi.com
0.0.0.0 blog.xiaomi.com
0.0.0.0 bss.pandora.xiaomi.com
0.0.0.0 c.id.mi.com
0.0.0.0 calopenupdate.comm.miui.com
0.0.0.0 cc.sys.intl.xiaomi.com
0.0.0.0 cc.sys.miui.com
0.0.0.0 cc2.sys.intl.xiaomi.com
0.0.0.0 cc2.sys.miui.com
0.0.0.0 ccc.sys.intl.xiaomi.com
0.0.0.0 ccc.sys.miui.com
0.0.0.0 cdn.ad.xiaomi.com
0.0.0.0 cdn.fds-ssl.api.xiaomi.com
0.0.0.0 clock.ad.xiaomi.com
0.0.0.0 cnc.fe01.lg.xiaomi.com
0.0.0.0 config.kuyun.com
0.0.0.0 connect.rom.miui.com
0.0.0.0 contactapi.micloud.xiaomi.net
0.0.0.0 controller.intl.xiaomi.com
0.0.0.0 ctc.fe01.c3.xiaomi.com
0.0.0.0 ctc.fe02.c3.xiaomi.com
0.0.0.0 d.xiaomi.com
0.0.0.0 data.game.xiaomi.com
0.0.0.0 data.mistat.intl.xiaomi.com
0.0.0.0 data.mistat.xiaomi.com
0.0.0.0 data.sec.miui.com
0.0.0.0 de.pandora.xiaomi.com
0.0.0.0 dev.api.zhuti.n.xiaomi.com
0.0.0.0 dev.market.n.xiaomi.com
0.0.0.0 dev.staging.api.developer.n.xiaomi.com
0.0.0.0 drm.market.xiaomi.com
0.0.0.0 dvb.pandora.xiaomi.com
0.0.0.0 e.ad.xiaomi.com
0.0.0.0 f1.g.mi.com
0.0.0.0 fcanr.tracking.miui.com
0.0.0.0 fe02.lg.xiaomi.com
0.0.0.0 fe05.lg.xiaomi.com
0.0.0.0 feedback.intl.miui.com
0.0.0.0 feedback.miui.com
0.0.0.0 file.market.xiaomi.com
0.0.0.0 file.xmpush.xiaomi.com
0.0.0.0 find.api.micloud.xiaomi.net
0.0.0.0 flash.sec.intl.miui.com
0.0.0.0 fr-app-chat-global-xiaomi-net-1516654448.eu-central-1.elb.amazonaws.com
0.0.0.0 fr.app.chat.global.xiaomi.net
0.0.0.0 gallery.cdn.pandora.xiaomi.com
0.0.0.0 gallery.pandora.xiaomi.com
0.0.0.0 game.xiaomi.com
0.0.0.0 geofence.sys.miui.com
0.0.0.0 global.market.xiaomi.com
0.0.0.0 global.preview.app.market.pt.xiaomi.com
0.0.0.0 global.search.xiaomi.net
0.0.0.0 globalapi.ad.xiaomi.com
0.0.0.0 gvod.aiseejapp.atianqi.com
0.0.0.0 hd.xiaomi.com
0.0.0.0 hd02.lg.xiaomi.com
0.0.0.0 heyue.xiaomi.com
0.0.0.0 hk.mibi.xiaomi.com
0.0.0.0 hm.xiaomi.com
0.0.0.0 huodong.xiaomi.com
0.0.0.0 huosai.xiaomi.com
0.0.0.0 i.mi.com
0.0.0.0 i.xiaomi.com
0.0.0.0 igame.xiaomi.com
0.0.0.0 image.box.xiaomi.com
0.0.0.0 image.cdn.mvideo.xiaomi.com
0.0.0.0 image.pandora.xiaomi.com
0.0.0.0 ime.api.xiaomi.com
0.0.0.0 imgg.traffic-media.co
0.0.0.0 info.analysis.kp.sec.miui.com
0.0.0.0 info.sec.miui.com
0.0.0.0 iosdl.game.xiaomi.com
0.0.0.0 jellyfish.pandora.xiaomi.com
0.0.0.0 lbs.pandora.xiaomi.com
0.0.0.0 lg-bgp.pandora.xiaomi.com
0.0.0.0 log.ad.xiaomi.com
0.0.0.0 login.game.xiaomi.com
0.0.0.0 logonext.tv.kuyun.com
0.0.0.0 logupdate.avlyun.sec.miui.com
0.0.0.0 m.bss.pandora.xiaomi.com
0.0.0.0 m.zhuti.xiaomi.com
0.0.0.0 market.xiaomi.com
0.0.0.0 mazu.sec.miui.com
0.0.0.0 mcc.intl.inf.miui.com
0.0.0.0 meihua.xiaomi.com
0.0.0.0 metok-ccc.intl.xiaomi.com
0.0.0.0 metok.sys.miui.com
0.0.0.0 mibi.api.xiaomi.com
0.0.0.0 mibi.xiaomi.com
0.0.0.0 micardapi.micloud.xiaomi.net
0.0.0.0 micloud.xiaomi.net
0.0.0.0 migrate.driveapi.micloud.xiaomi.net
0.0.0.0 milink.pandora.xiaomi.com
0.0.0.0 mis.migc.xiaomi.com
0.0.0.0 mishop.cdn.pandora.xiaomi.com
0.0.0.0 mishop.pandora.xiaomi.com
0.0.0.0 mitunes.game.xiaomi.com
0.0.0.0 miui.com
0.0.0.0 miui.net
0.0.0.0 mlog.search.xiaomi.net
0.0.0.0 mp.huangye.miui.com
0.0.0.0 new.api.ad.xiaomi.com
0.0.0.0 notice.game.xiaomi.com
0.0.0.0 o2o.api.xiaomi.com
0.0.0.0 onebox.api.zhuti.n.xiaomi.com
0.0.0.0 onebox.market.n.xiaomi.com
0.0.0.0 order.music.xiaomi.com
0.0.0.0 pdc.micloud.xiaomi.net
0.0.0.0 phonecallapi.micloud.xiaomi.net
0.0.0.0 pmall.migc.xiaomi.com
0.0.0.0 ppurifier.game.xiaomi.com
0.0.0.0 ptmi.gitv.pandora.xiaomi.com
0.0.0.0 qiye.xiaomi.com
0.0.0.0 r.browser.miui.com
0.0.0.0 r.sg.sec.miui.com
0.0.0.0 reader.browser.miui.com
0.0.0.0 register.xmpush.global.xiaomi.com
0.0.0.0 register.xmpush.xiaomi.com
0.0.0.0 relocationapi.micloud.xiaomi.net
0.0.0.0 resolver.gslb.mi-idc.com
0.0.0.0 resolver.msg.global.xiaomi.net
0.0.0.0 resolver.msg.xiaomi.net
0.0.0.0 ruac.account.xiaomi.com
0.0.0.0 sandbox.xmpush.xiaomi.com
0.0.0.0 sdkconfig.ad.intl.xiaomi.com
0.0.0.0 sdkconfig.ad.xiaomi.com
0.0.0.0 sec-cdn.static.xiaomi.net
0.0.0.0 sec.resource.xiaomi.net
0.0.0.0 secode2.hd.xiaomi.com
0.0.0.0 sfsapi.micloud.xiaomi.net
0.0.0.0 sgpac.account.xiaomi.com
0.0.0.0 shenghuo.xiaomi.com
0.0.0.0 shoes.app-xae.xiaomi.com
0.0.0.0 ssp.ad.xiaomi.com
0.0.0.0 staging.ai.api.xiaomi.com
0.0.0.0 staging.api.zhuti.n.xiaomi.com
0.0.0.0 staging.appapi.n.xiaomi.com
0.0.0.0 staging.market.n.xiaomi.com
0.0.0.0 starfish.pandora.xiaomi.com
0.0.0.0 stat.pandora.xiaomi.com
0.0.0.0 stat.xiaomi.com
0.0.0.0 static.game.xiaomi.com
0.0.0.0 static.mibi.xiaomi.com
0.0.0.0 statusapi.micloud.xiaomi.net
0.0.0.0 storeconfig.mistat.intl.xiaomi.com
0.0.0.0 t1.g.mi.com
0.0.0.0 tc.hd.xiaomi.com
0.0.0.0 tel.fe01.hh.xiaomi.com
0.0.0.0 test.ad.xiaomi.com
0.0.0.0 test.e.ad.xiaomi.com
0.0.0.0 test.log.ad.xiaomi.com
0.0.0.0 test.new.api.ad.xiaomi.com
0.0.0.0 test.xiaomi.com
0.0.0.0 test.zeus.ad.xiaomi.com
0.0.0.0 thm.market.xiaomi.com
0.0.0.0 tracking.intl.miui.com
0.0.0.0 tracking.miui.com
0.0.0.0 trial.api.huangye.miui.com
0.0.0.0 tv.app.migc.xiaomi.com
0.0.0.0 update.avlyun.sec.miui.com
0.0.0.0 update.intl.miui.com
0.0.0.0 update.miui.com
0.0.0.0 upgrade.mishop.pandora.xiaomi.com
0.0.0.0 us.find.api.micloud.xiaomi.net
0.0.0.0 us.galleryapi.micloud.xiaomi.net
0.0.0.0 us.statusapi.micloud.xiaomi.net
0.0.0.0 userid.xiaomi.com
0.0.0.0 video.intl.xiaomi.com
0.0.0.0 video.xiaomi.com
0.0.0.0 voip.game.xiaomi.com
0.0.0.0 wallpaper.cdn.pandora.xiaomi.com
0.0.0.0 wallpaper.pandora.xiaomi.com
0.0.0.0 wap.game.xiaomi.com
0.0.0.0 weather.pandora.xiaomi.com
0.0.0.0 weatherapi.market.xiaomi.com
0.0.0.0 wifiapi.micloud.xiaomi.net
0.0.0.0 www.miui.com
0.0.0.0 www.xiaomi.com
0.0.0.0 xiaomi.com
0.0.0.0 xiaomi.net
0.0.0.0 xiazai.xiaomi.com
0.0.0.0 xitong.xiaomi.com
0.0.0.0 xlmc.sec.miui.com
0.0.0.0 xshare.api.xiaomi.com
0.0.0.0 zeus.ad.intl.xiaomi.com
0.0.0.0 zeus.ad.xiaomi.com
0.0.0.0 zhuti.xiaomi.com
0.0.0.0 zx.game.xiaomi.com
Does this list^ also work with Adguard?

How to forward traffic from eth0 to ppp0 (AOSP embedded project)

I am using Android 10 on a custom device (Variscite imx8). The Android image has been generated by AOSP.
I need to forward the traffico from the eth0 to the ppp0 (Quectel LTE module) interface.
I've managed to enable the ppp0 interface by using the pppd script (i.e.: pppd call my-connection-info) and I can see that I receive the two DNS server addresses and my public IPv4 successfully.
Now the first weird thing: If I ping to 8.8.8.8 I receive "connect: Network is unreachable" meanwhile if I specify the ppp0 interface with ping -I ppp0 8.8.8.8 I can successfully ping the target. I've added the following routing table with priority 25000 so that I'm able to ping 8.8.8.8 without specifying the interface:
Code:
ip rule add prio 250000 from all lookup 25000
ip rule add table 25000 default via <my-public-ip> dev ppp0
Now I want to forward the eth0 traffic to the ppp0, to do so I've tried the following commands:
Code:
$ echo 1 > /proc/sys/net/ipv4/ip_forward
$ iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
But the PC on the other end of the eth0 interfce still prompts "From 192.168.10.1 icmp_seq=xxx Destination Net Unreachable" where 192.168.10.1 address is the Android device (which acts like a gateway).
This is the content of netstat -rn command:
Code:
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 10.64.64.64 0.0.0.0 UG 0 0 0 ppp0
10.64.64.64 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.10.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
This is the output of netstat -rn:
Code:
default via 10.64.64.64 dev ppp0
10.64.64.64 dev ppp0 proto kernel scope link src <my-public-ip>
192.168.10.0/24 dev eth0 proto kernel scope link src 192.168.10.1
This is the output of iptables -L (which I've flushed with iptables -F, iptables -X and iptables -t nat -F):
Code:
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Which is the issue here? Thank you.

Categories

Resources