IPv6 and IoT News Archives - IPv6.net https://ipv6.net/c/news/ The IPv6 and IoT Resources Fri, 01 May 2026 10:07:05 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 ESP-FLY DIY Kit is a tiny ESP32-S3-based DIY micro drone kit https://ipv6.net/news/esp-fly-diy-kit-is-a-tiny-esp32-s3-based-diy-micro-drone-kit/ Fri, 01 May 2026 10:07:05 +0000 https://ipv6.net/?p=2909395 ESP-FLY DIY kit is a miniature DIY drone kit based on Seeed Studio’s XIAO ESP32-S3 board that was initially introduced as a DIY project on Instructables by Max Imagination, but is now available as a complete kit for $59.99 on Seeed Studio. It’s certainly not the first ESP32 drone, but the ESP-FLY drone must be […]

The post ESP-FLY DIY Kit is a tiny ESP32-S3-based DIY micro drone kit appeared first on IPv6.net.

]]>
ESP-FLY miniature ESP32-S3 Drone

ESP-FLY DIY kit is a miniature DIY drone kit based on Seeed Studio’s XIAO ESP32-S3 board that was initially introduced as a DIY project on Instructables by Max Imagination, but is now available as a complete kit for $59.99 on Seeed Studio. It’s certainly not the first ESP32 drone, but the ESP-FLY drone must be the smallest, as the miniature (67 x 67 x 31mm) quadcopter design allows users to store into any pocket or small boxes. It’s mainly designed for STEM education,  hobbyist DIY Projects, and indoor flight practice. ESP-FLY drone kit key features and specifications: Main Controller – Seeed Studio XIAO ESP32-S3 board Wireless MCU – Espressif Systems ESP32-S3R8 CPU – Dual-core Tensilica LX7 microcontroller @ 240 MHz System Memory – 512KB SRAM, 8MB PSRAM Wireless – Wi-Fi 4 & Bluetooth 5.0 dual-mode (Classic + BLE) connectivity Storage – 8MB SPI flash Antenna – External u.FL antenna USB […]

The post ESP-FLY DIY Kit is a tiny ESP32-S3-based DIY micro drone kit appeared first on CNX Software – Embedded Systems News.

Read more here: https://www.cnx-software.com/2026/05/01/esp-fly-diy-kit-tiny-esp32-s3-based-diy-micro-drone-kit/

The post ESP-FLY DIY Kit is a tiny ESP32-S3-based DIY micro drone kit appeared first on IPv6.net.

]]>
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs https://ipv6.net/news/anti-ddos-firm-heaped-attacks-on-brazilian-isps/ Thu, 30 Apr 2026 14:37:06 +0000 https://ipv6.net/?p=2909299 A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work […]

The post Anti-DDoS Firm Heaped Attacks on Brazilian ISPs appeared first on IPv6.net.

]]>

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company’s public image.

An Archer AX21 router from TP-Link. Image: tp-link.com.

For the past several years, security experts have tracked a series of massive DDoS attacks originating from Brazil and solely targeting Brazilian ISPs. Until recently, it was less than clear who or what was behind these digital sieges. That changed earlier this month when a trusted source who asked to remain anonymous shared a curious file archive that was exposed in an open directory online.

The exposed archive contained several Portuguese-language malicious programs written in Python. It also included the private SSH authentication keys belonging to the CEO of Huge Networks, a Brazilian ISP that primarily offers DDoS protection to other Brazilian network operators.

Founded in Miami, Fla. in 2014, Huge Networks’s operations are centered in Brazil. The company originated from protecting game servers against DDoS attacks and evolved into an ISP-focused DDoS mitigation provider. It does not appear in any public abuse complaints and is not associated with any known DDoS-for-hire services.

Nevertheless, the exposed archive shows that a Brazil-based threat actor maintained root access to Huge Networks infrastructure and built a powerful DDoS botnet by routinely mass-scanning the Internet for insecure Internet routers and unmanaged domain name system (DNS) servers on the Web that could be enlisted in attacks.

DNS is what allows Internet users to reach websites by typing familiar domain names instead of the associated IP addresses. Ideally, DNS servers only provide answers to machines within a trusted domain. But so-called “DNS reflection” attacks rely on DNS servers that are (mis)configured to accept queries from anywhere on the Web. Attackers can send spoofed DNS queries to these servers so that the request appears to come from the target’s network. That way, when the DNS servers respond, they reply to the spoofed (targeted) address.

By taking advantage of an extension to the DNS protocol that enables large DNS messages, botmasters can dramatically boost the size and impact of a reflection attack — crafting DNS queries so that the responses are much bigger than the requests. For example, an attacker could compose a DNS request of less than 100 bytes, prompting a response that is 60-70 times as large. This amplification effect is especially pronounced when the perpetrators can query many DNS servers with these spoofed requests from tens of thousands of compromised devices simultaneously.

A DNS amplification attack, illustrated. It shows an attacker on the left, sending malicious commands to a number of bots to the immediate right, which then make spoofed DNS queries with the source address as the target's IP address.

A DNS amplification and reflection attack, illustrated. Image: veracara.digicert.com.

The exposed file archive includes a command-line history showing exactly how this attacker built and maintained a powerful botnet by scouring the Internet for TP-Link Archer AX21 routers. Specifically, the botnet seeks out TP-Link devices that remain vulnerable to CVE-2023-1389, an unauthenticated command injection vulnerability that was patched back in April 2023.

Malicious domains in the exposed Python attack scripts included DNS lookups for hikylover[.]st, and c.loyaltyservices[.]lol, both domains that have been flagged in the past year as control servers for an Internet of Things (IoT) botnet powered by a Mirai malware variant.

The leaked archive shows the botmaster coordinated their scanning from a Digital Ocean server that has been flagged for abusive activity hundreds of times in the past year. The Python scripts invoke multiple Internet addresses assigned to Huge Networks that were used to identify targets and execute DDoS campaigns. The attacks were strictly limited to Brazilian IP address ranges, and the scripts show that each selected IP address prefix was attacked for 10-60 seconds with four parallel processes per host before the botnet moved on to the next target.

The archive also shows these malicious Python scripts relied on private SSH keys belonging to Huge Networks’s CEO, Erick Nascimento. Reached for comment about the files, Mr. Nascimento said he did not write the attack programs and that he didn’t realize the extent of the DDoS campaigns until contacted by KrebsOnSecurity.

“We received and notified many Tier 1 upstreams regarding very very large DDoS attacks against small ISPs,” Nascimento said. “We didn’t dig deep enough at the time, and what you sent makes that clear.”

Nascimento said the unauthorized activity is likely related to a digital intrusion first detected in January 2026 that compromised two of the company’s development servers, as well as his personal SSH keys. But he said there’s no evidence those keys were used after January.

“We notified the team in writing the same day, wiped the boxes, and rotated keys,” Nascimento said, sharing a screenshot of a January 11 notification from Digital Ocean. “All documented internally.”

Mr. Nascimento said Huge Networks has since engaged a third-party network forensics firm to investigate further.

“Our working assessment so far is that this all started with a single internal compromise — one pivot point that gave the attacker downstream access to some resources, including a legacy personal droplet of mine,” he wrote.

“The compromise happened through a bastion/jump server that several people had access to,” Nascimento continued. “Digital Ocean flagged the droplet on January 11 — compromised due to a leaked SSH key, in their wording — I was traveling at the time and addressed it on return. That droplet was deprecated and destroyed, and it was never part of Huge Networks infrastructure.”

The malicious software that powers the botnet of TP-Link devices used in the DDoS attacks on Brazilian ISPs is based on Mirai, a malware strain that made its public debut in September 2016 by launching a then record-smashing DDoS attack that kept this website offline for four days. In January 2017, KrebsOnSecurity identified the Mirai authors as the co-owners of a DDoS mitigation firm that was using the botnet to attack gaming servers and scare up new clients.

In May 2025, KrebsOnSecurity was hit by another Mirai-based DDoS that Google called the largest attack it had ever mitigated. That report implicated a 20-something Brazilian man who was running a DDoS mitigation company as well as several DDoS-for-hire services that have since been seized by the FBI.

Nascimento flatly denied being involved in DDoS attacks against Brazilian operators to generate business for his company’s services.

“We don’t run DDoS attacks against Brazilian operators to sell protection,” Nascimento wrote in response to questions. “Our sales model is mostly inbound and through channel integrator, distributors, partners — not active prospecting based on market incidents. The targets in the scripts you received are small regional providers, the vast majority of which are neither in our customer base nor in our commercial pipeline — a fact verifiable through public sources like QRator.”

Nascimento maintains he has “strong evidence stored on the blockchain” that this was all done by a competitor. As for who that competitor might be, the CEO wouldn’t say.

“I would love to share this with you, but it could not be published as it would lose the surprise factor against my dishonest competitor,” he explained. “Coincidentally or not, your contact happened a week before an important event – ​​one that this competitor has NEVER participated in (and it’s a traditional event in the sector). And this year, they will be participating. Strange, isn’t it?”

Strange indeed.

Read more here: https://krebsonsecurity.com/2026/04/anti-ddos-firm-heaped-attacks-on-brazilian-isps/

The post Anti-DDoS Firm Heaped Attacks on Brazilian ISPs appeared first on IPv6.net.

]]>
M5Stack Cardputer goes off-grid with new Mesh Kit featuring LoRa, GNSS, and Meshtastic support https://ipv6.net/news/m5stack-cardputer-goes-off-grid-with-new-mesh-kit-featuring-lora-gnss-and-meshtastic-support/ Thu, 30 Apr 2026 09:37:06 +0000 https://ipv6.net/?p=2909242 M5Stack has just launched the Cardputer Mesh Kit, a portable, card-sized Meshtastic communication terminal built around the ESP32-S3-powered Cardputer-Adv controller and a new LoRa expansion module (CapLoRa-1262). The kit is essentially a modular upgrade to the original Cardputer, where the base unit handles the UI via a 56-key keyboard and a 1.14-inch LCD. The added […]

The post M5Stack Cardputer goes off-grid with new Mesh Kit featuring LoRa, GNSS, and Meshtastic support appeared first on IPv6.net.

]]>
Cardputer Mesh Kit for Meshtastic (ESP32 S3)

M5Stack has just launched the Cardputer Mesh Kit, a portable, card-sized Meshtastic communication terminal built around the ESP32-S3-powered Cardputer-Adv controller and a new LoRa expansion module (CapLoRa-1262). The kit is essentially a modular upgrade to the original Cardputer, where the base unit handles the UI via a 56-key keyboard and a 1.14-inch LCD. The added “Cap” module adds a Semtech SX1262 transceiver and an AT6668 GNSS module, allowing for off-grid text messaging and GPS location tracking without relying on cellular networks. Cardputer Mesh Kit specifications: Core Controller (Cardputer-Adv): Wireless MCU module – M5Stack M5Stamp S3A with SoC – Espressif Systems ESP32-S3FN8 CPU Dual-core 32-bit Xtensa LX7 microcontroller with AI vector instructions up to 240MHz RISC-V ULP co-processor Memory – 512KB SRAM Storage – 8MB flash Wireless – 2.4GHz WiFi 4 (802.11b/g/n), Bluetooth 5.0 BLE + Mesh 2.4GHz 3D antenna USB – 1x USB Type-C port Expansion connectors for I/Os such as SPI, I2C, […]

The post M5Stack Cardputer goes off-grid with new Mesh Kit featuring LoRa, GNSS, and Meshtastic support appeared first on CNX Software – Embedded Systems News.

Read more here: https://www.cnx-software.com/2026/04/30/m5stack-cardputer-goes-off-grid-with-new-mesh-kit-featuring-lora-gnss-and-meshtastic-support/

The post M5Stack Cardputer goes off-grid with new Mesh Kit featuring LoRa, GNSS, and Meshtastic support appeared first on IPv6.net.

]]>
[Podcast] CIDR inside https://ipv6.net/news/podcast-cidr-inside/ Wed, 29 Apr 2026 22:37:06 +0000 https://ipv6.net/?p=2909177 Geoff Huston discusses the CIDR Report, a 30-year-long series of data about who is sending excess data in BGP. Does the CIDR Report still hold value? Read more here: https://blog.apnic.net/2026/04/30/podcast-cidr-inside/

The post [Podcast] CIDR inside appeared first on IPv6.net.

]]>
Geoff Huston discusses the CIDR Report, a 30-year-long series of data about who is sending excess data in BGP. Does the CIDR Report still hold value?

Read more here: https://blog.apnic.net/2026/04/30/podcast-cidr-inside/

The post [Podcast] CIDR inside appeared first on IPv6.net.

]]>
A robot arm that recognizes your face https://ipv6.net/news/a-robot-arm-that-recognizes-your-face/ Wed, 29 Apr 2026 18:37:06 +0000 https://ipv6.net/?p=2909161 The earliest commercial robots, like those used in factories for assembly, weren’t intelligent at all — they simply moved motors in sequence according to pre-programmed commands. But today we can build sophisticated robots that respond to their environment and even people. More importantly, that is possible on a modest budget with off-the-shelf parts. Luca Di […]

The post A robot arm that recognizes your face appeared first on IPv6.net.

]]>

The earliest commercial robots, like those used in factories for assembly, weren’t intelligent at all — they simply moved motors in sequence according to pre-programmed commands. But today we can build sophisticated robots that respond to their environment and even people. More importantly, that is possible on a modest budget with off-the-shelf parts. Luca Di Lorenzo (AKA LucaDilo) proved that by using an Arduino® UNO™ Q to create a robot arm that detects faces and acts accordingly.

In this case, the robot arm reacts to seeing a person’s face by picking up a pen and handing it to them. That is only moderately useful, but it is really just a demonstration of the hardware and capability. It shows that the robot can see what is around it and act accordingly. 

LucaDilo was able to achieve that with very affordable and accessible hardware, starting with an UNO Q. Not only does that direct the robot arm’s Feetech serial servo motors with its microcontroller, but it also performs facial recognition on the Linux side with a USB webcam. An optional Modulino™ LED Matrix provides status, feedback, and a dash of charm.

The structure and mechanical parts of the robot arm are all 3D-printable, even including the gripper mechanism.

LucaDilo programmed the arm so that upon startup, it enters into a setup mode. In that mode, the user can physically move the arm to a desired home position and up to nine different pen slot positions. After that, the robot will know where to move to pick up a pen when it sees a face.

The total build cost for this robot should be under $100/€85, which is pretty incredible when you consider how much computational power goes into just recognizing a face.

The post A robot arm that recognizes your face appeared first on Arduino Blog.

Read more here: https://blog.arduino.cc/2026/04/29/a-robot-arm-that-recognizes-your-face/

The post A robot arm that recognizes your face appeared first on IPv6.net.

]]>
Arduino® App Lab 0.7: Custom Bricks are here! https://ipv6.net/news/arduino-app-lab-0-7-custom-bricks-are-here/ Wed, 29 Apr 2026 17:07:07 +0000 https://ipv6.net/?p=2909147 Remember at Arduino Days when we teased something that would fundamentally change how you build with App Lab? That moment is here. Arduino App Lab 0.7 introduces Custom Bricks and with it, the power to extend the apps for your Arduino® UNO Q board and enjoy more creative freedom. Alongside this release, we are also […]

The post Arduino® App Lab 0.7: Custom Bricks are here! appeared first on IPv6.net.

]]>

Remember at Arduino Days when we teased something that would fundamentally change how you build with App Lab? That moment is here. Arduino App Lab 0.7 introduces Custom Bricks and with it, the power to extend the apps for your Arduino® UNO™ Q board and enjoy more creative freedom. Alongside this release, we are also introducing a new documentation experience designed to make learning App Lab feel more natural and intuitive from the very first step.

What are Custom Bricks?

Bricks are modular software components that add ready-to-use functionalities to your projects. If you’re new to Arduino App Lab, it helps to think about them as building blocks for complex features – without the complexity.

Until now, you’ve been working with the built-in Bricks we provide such as AI Audio and Computer Vision, or Web User Interface. Now you can build your own.

Custom Bricks transform App Lab from a powerful tool into an extensible platform. Build something once, package it as a Brick, and reuse it across every app you create. Connect to databases and integrate AI models. If you can code it in Python, you can make a Brick out of it.

Two flavors of custom

Custom Bricks come in two varieties, suited to different levels of complexity:

1. Python-only Bricks

The simplest approach. Create a Python library that exposes an API to your main program. Perfect for utility functions, data processing, or custom algorithms you want to reuse across projects.

2. Python + Container Bricks

Add Docker containers to your Brick for more powerful capabilities. Run specialized tools, APIs, or services alongside your app.

See Custom Bricks in action: OCR in minutes

During Arduino Days, our colleague Davide demonstrated Custom Bricks by building an OCR (Optical Character Recognition) Brick from scratch, live on stage. He took an object detection example, created a custom Brick, added a Docker container running Tesseract OCR, wrote the Python interface, and had working text recognition in a matter of minutes.

The result? A reusable OCR Brick that any app can import and use with a single function call. Upload an image, get back the text. Simple, powerful, and now part of his development toolkit forever.

Watch Davide’s full Custom Brick demo from Arduino Days 2026

How to create your first Custom Brick
Getting started is straightforward — just follow these easy steps:

1. Create or open an app in App Lab.
2. Select “Add Brick.”
3. At the bottom of your screen, select “Create Custom Brick.”
4. Give it a name and let the system work its magic.

Create Custom Brick is available at the bottom bar inside a Brick

App Lab automatically generates a folder structure with everything you need:

  • brick_config: Your Brick’s identity and configuration – ID, name, variables, etc.
  • brick_compose: A Docker Compose file for any containers
  • __init__.py: Your Python code, where you define the functions and classes that make your Brick useful

Each Custom Brick lives locally in your app, fully under your control. Define a function like hello_arduino() in your Brick’s __init__.py, then import and call it from main.py

A folder structure is automatically added on the left hand side upon the creation of your Custom Brick

Brick_config lets you define your Custom Brick’s identity and setup

What will you build with a Custom Brick?

A Custom Brick in App Lab 0.7

Custom Bricks unlock new possibilities, new freedom: 

  • Connect to any database (PostgreSQL, MongoDB, MariaDB – you name it)
  • Integrate custom ML models trained for your specific use case
  • Add containerized IoT services such as MQTT brokers, dashboard managers or your own middleware
  • Interface with audio/video processing tools
  • Build domain-specific libraries for your industry or research
  • Package complex workflows into simple, sharable components

The OCR demo is just the beginning. We can’t wait to see what the Arduino community creates.

What else is new in 0.7?

In this release, in addition to Custom Bricks, we’ve made Arduino App Lab smoother and more intuitive across the board:

  • Console panel redesign: The console (including logs and serial monitor) is no longer a separate tab – it’s now integrated directly into the editor page.

Enhanced App Lab editor with the integrated console panel at the bottom

  • Drag-and-drop file management: Your file tree now supports drag-and-drop organization. Plus, you can also rename and delete folders directly. And much more: Bug fixes, performance improvements, and quality-of-life updates throughout. 

Drag-and-drop file management is now possible in Arduino App Lab 0.7 version

New App Lab documentation experience

Over time, Arduino App Lab has grown in capabilities, and with it, the documentation has naturally expanded as well. What we noticed is that users often wanted a quicker way to find the right information for their specific goal, without needing to scan through longer pages or figure out where to start. 

That’s why App Lab content is now organized by user journey and feature, with clear sections for getting started, setup, Bricks, and apps. A guided flow on the homepage helps you quickly reach the most relevant information (see below).

We also added new setup guides for each configuration, a dedicated Bridge API reference, and full Arduino App CLI command documentation to support more advanced use cases.

So it feels less like searching through a manual and more like being guided through a workspace where everything is ready when you need it.

A guided flow on the documentation homepage helps you quickly reach the most relevant information 

Get started today

Arduino App Lab 0.7 is available now. Update through the app or download from this page. And check-out our refreshed App Lab documentation site. 

Did you build something cool with Custom Bricks? Share it with the community on Arduino Project Hub – we’re excited to see what you do with this cool new update.

Arduino and UNO are trademarks or registered trademarks of Arduino S.r.l.


The post Arduino® App Lab 0.7: Custom Bricks are here! appeared first on Arduino Blog.

Read more here: https://blog.arduino.cc/2026/04/29/arduino-app-lab-0-7-custom-bricks-are-here/

The post Arduino® App Lab 0.7: Custom Bricks are here! appeared first on IPv6.net.

]]>
MiciMike’s open-source drop-in PCB converts Google Home Mini into a local voice assistant (Crowdfunding) https://ipv6.net/news/micimikes-open-source-drop-in-pcb-converts-google-home-mini-into-a-local-voice-assistant-crowdfunding/ Wed, 29 Apr 2026 11:07:04 +0000 https://ipv6.net/?p=2909090 The MiciMike Home Mini Drop-In PCB is an open-source replacement mainboard designed to convert a 1st Gen Google Home Mini into a fully local, privacy-focused voice assistant running Home Assistant Voice. Built around an ESP32-S3 MCU and an XMOS XU316 audio processor, it removes cloud dependencies without any case modifications or soldering. The board offers […]

The post MiciMike’s open-source drop-in PCB converts Google Home Mini into a local voice assistant (Crowdfunding) appeared first on IPv6.net.

]]>
MiciMike Home Mini Drop In PCB

The MiciMike Home Mini Drop-In PCB is an open-source replacement mainboard designed to convert a 1st Gen Google Home Mini into a fully local, privacy-focused voice assistant running Home Assistant Voice. Built around an ESP32-S3 MCU and an XMOS XU316 audio processor, it removes cloud dependencies without any case modifications or soldering. The board offers on-device wake word detection, echo cancellation, and noise suppression via two MEMS microphones, and comes pre-flashed with ESPHome for easy Home Assistant integration. The PCBA fully supports local voice processing, optional cloud LLM integration, media playback, and Snapcast. It’s released as open hardware under the CERN-OHL-S v2 license, with complete design files available, making it suitable for privacy-focused smart-home automation, DIY voice assistants, and hardware-reuse projects. MiciMike Home Mini Drop-In PCB specifications: Compatibility – Google Home Mini 1st generation Wireless MCU – Espressif Systems ESP32-S3 CPU –  Dual-core Xtensa LX7 microcontroller @ up to 240 […]

The post MiciMike’s open-source drop-in PCB converts Google Home Mini into a local voice assistant (Crowdfunding) appeared first on CNX Software – Embedded Systems News.

Read more here: https://www.cnx-software.com/2026/04/29/micimike-open-source-drop-in-pcb-converts-google-home-mini-into-a-local-voice-assistant/

The post MiciMike’s open-source drop-in PCB converts Google Home Mini into a local voice assistant (Crowdfunding) appeared first on IPv6.net.

]]>
From BGP Data to Insight: Simplifying Real-Time Routing Analysis https://ipv6.net/news/from-bgp-data-to-insight-simplifying-real-time-routing-analysis/ Wed, 29 Apr 2026 10:07:11 +0000 https://ipv6.net/?p=2909071 The IHR BGP monitoring tool is a simple web-based application that leverages the RIS Live and BGPlay APIs to monitor your prefixes and their RPKI status. Read more here: https://labs.ripe.net/author/romain_fontugne/from-bgp-data-to-insight-simplifying-real-time-routing-analysis/

The post From BGP Data to Insight: Simplifying Real-Time Routing Analysis appeared first on IPv6.net.

]]>
The IHR BGP monitoring tool is a simple web-based application that leverages the RIS Live and BGPlay APIs to monitor your prefixes and their RPKI status.

Read more here: https://labs.ripe.net/author/romain_fontugne/from-bgp-data-to-insight-simplifying-real-time-routing-analysis/

The post From BGP Data to Insight: Simplifying Real-Time Routing Analysis appeared first on IPv6.net.

]]>
SONOFF NSPanel Pro Gen2 – A 86-Type Smart Home control panel with two relays, dual-band WiFi, Zigbee 3.0, Matter support https://ipv6.net/news/sonoff-nspanel-pro-gen2-a-86-type-smart-home-control-panel-with-two-relays-dual-band-wifi-zigbee-3-0-matter-support/ Wed, 29 Apr 2026 10:07:05 +0000 https://ipv6.net/?p=2909076 SONOFF NSPanel Pro Gen2 is an 86-type Smart Home control panel featuring a 3.95-inch touch display, two relays supporting up to 10A, and dual-band WiFi 4, Bluetooth LE, and Zigbee 3.0 connectivity. The device also integrates a 1.5W speaker and a microphone for voice interaction, light and proximity sensors, and runs Android on a Rockchip […]

The post SONOFF NSPanel Pro Gen2 – A 86-Type Smart Home control panel with two relays, dual-band WiFi, Zigbee 3.0, Matter support appeared first on IPv6.net.

]]>
SONOFF NSPanel Pro Gen2

SONOFF NSPanel Pro Gen2 is an 86-type Smart Home control panel featuring a 3.95-inch touch display, two relays supporting up to 10A, and dual-band WiFi 4, Bluetooth LE, and Zigbee 3.0 connectivity. The device also integrates a 1.5W speaker and a microphone for voice interaction, light and proximity sensors, and runs Android on a Rockchip RK3326-S SoC paired with 2GB RAM and 32GB eMMC flash. SONOFF NSPanel Pro Gen2 specifications: SoC – Rockchip RK3326-S CPU – Quad-core Cortex-A35 processor @ 1.5 GHz GPU – Arm Mali-G31 GPU System Memory – 2GB DDR3 Storage – 32GB eMMC 5.1 flash Display – 3.95-inch capacitive touchscreen color TFT display with 480×480 resolution Audio – 1.5W speaker, digital microphone for two-way communication (intercom) Connectivity Zigbee 3.0 support via EFR32MG24 Dual-band 2.4 GHz and 5 GHz WiFi + Bluetooth Matter support Relay – Dual-gang relay up to 5A per gang, or 10A in total (resistive […]

The post SONOFF NSPanel Pro Gen2 – A 86-Type Smart Home control panel with two relays, dual-band WiFi, Zigbee 3.0, Matter support appeared first on CNX Software – Embedded Systems News.

Read more here: https://www.cnx-software.com/2026/04/29/sonoff-nspanel-pro-gen2-a-86-type-smart-home-control-panel-two-relays-dual-band-wifi-zigbee-3-0-matter-support/

The post SONOFF NSPanel Pro Gen2 – A 86-Type Smart Home control panel with two relays, dual-band WiFi, Zigbee 3.0, Matter support appeared first on IPv6.net.

]]>
MoreSense MS-07 – An ESP32-S3 indoor air quality monitor with SEN66 multisensor and Home Assistant support https://ipv6.net/news/moresense-ms-07-an-esp32-s3-indoor-air-quality-monitor-with-sen66-multisensor-and-home-assistant-support/ Wed, 29 Apr 2026 03:37:05 +0000 https://ipv6.net/?p=2909054 MoreSense MS-07 indoor air quality monitor is built around the Sensirion SEN66 multisensor, powered by an ESP32-S3 microcontroller, and features a 3.5-inch capacitive IPS touchscreen for local data visualization and control. The MS-07 is a direct upgrade to the earlier MS-06, replacing the Sensirion SCD40 used for basic CO₂, temperature, and humidity measurement with the […]

The post MoreSense MS-07 – An ESP32-S3 indoor air quality monitor with SEN66 multisensor and Home Assistant support appeared first on IPv6.net.

]]>
MoreSense MS-07 CO2 PM NOx VOC Temp and Hum Wifi Sensor

MoreSense MS-07 indoor air quality monitor is built around the Sensirion SEN66 multisensor, powered by an ESP32-S3 microcontroller, and features a 3.5-inch capacitive IPS touchscreen for local data visualization and control. The MS-07 is a direct upgrade to the earlier MS-06, replacing the Sensirion SCD40 used for basic CO₂, temperature, and humidity measurement with the more advanced Sensirion SEN66 multisensor, which adds support for PM1.0, PM2.5, PM4.0, PM10, nitrogen oxides (NOx), and volatile organic compounds (VOCs). Like the previous model, it focuses on local operation and privacy, and supports integration with Home Assistant and Domoticz via MQTT autodiscovery, as well as Homey through the HomeyDuino app. It is typically used in homes, offices, and indoor environments to track air quality, comfort levels, and pollution metrics in real time. MoreSense MS-07 specifications: Microcontroller – ESP32-S3 SoC, dual-core XTensa LX7 @ up to 240 MHz; 512KB SRAM; Integrated 2.4GHz Wi-Fi and BLE Storage […]

The post MoreSense MS-07 – An ESP32-S3 indoor air quality monitor with SEN66 multisensor and Home Assistant support appeared first on CNX Software – Embedded Systems News.

Read more here: https://www.cnx-software.com/2026/04/29/moresense-ms-07-an-esp32-s3-indoor-air-quality-monitor-with-sen66-multisensor-and-home-assistant-support/

The post MoreSense MS-07 – An ESP32-S3 indoor air quality monitor with SEN66 multisensor and Home Assistant support appeared first on IPv6.net.

]]>