I run an ad blocker on my home network that blocks some domains based upon whether the domains are in known lists or not. Whenever I have T212 running in a browser, I can see that the ad blocker is blocking calls to the following domain:
stats DOT azmsoft DOT com
The ad blocker shows that the requests are sent every 10 seconds or so and the requests stop when I close T212 down in my browser. I can see that the requests are coming from the device I had T212 open on, they weren’t coming from a different device.
Azmsoft appears to be a company in Kenya and worryingly, the name gets mentioned in some malware reports on joesandbox.com
Is T212 using this domain for some legitimate purpose? It’s definitely T212 making these requests because the Android app makes the same requests as well.
@phildawson Thanks, I found that when Googling them and making the ‘Kenya’ link. I am just somewhat apprehensive about T212 making so many requests to that domain and would really like to have some idea as to what is going on, even if a very basic explanation to set my mind at ease.
At the moment Pi-Hole is blocking the requests so it’s no skin off my back, but might be for other people.
It just looks like marker points for debugging so they can see where the application is getting stuck. The data being sent with the event is just really your session id / customer uid.