![](https://a889d98a.designspark.com/7d751ad7/22.2.2/images/avatars/dave.webp)
How do you feel about this article? Help us to provide better content for you.
![](https://a889d98a.designspark.com/7d751ad7/22.2.2/images/avatars/dave.webp)
Thank you! Your feedback has been received.
![](https://a889d98a.designspark.com/7d751ad7/22.2.2/images/avatars/dave.webp)
There was a problem submitting your feedback, please try again later.
![](https://a889d98a.designspark.com/7d751ad7/22.2.2/images/avatars/dave.webp)
What do you think of this article?
What do you do when you think you may have a rogue IoT device on your network?
In this video, we use an Okdo Rock 4C+ board (249-3158) to simulate our ‘suspect’ IoT device and another Rock 4SE (220-9536) to monitor its network traffic. Join me as we use some free, open-source tools to see what’s going on with our network.
Theory and practice
In this first video, I will explain the theory and practice of how we go about monitoring our 'suspect' device
Monitoring EXTRA!
This second video is an EXTRA! Short update, which shows the results of a long monitoring session
Comments