The TetherBox device detection is quite sophisticated and is part of the "secret sauce" of how TetherX make it easy to detect, configure and monitor devices across networks.

The TetherBox will automatically detect if a device changes its IP, if services are enabled/disabled, if there are health problems on the device and more.

What methods are used to scan

TetherX use a combination of standard scanning methods as well as internally developed methods to identify devices. Some of the methods include:

  1. Pinging relevant IPs (ICMP).

  2. Checking the ARP table of nearby switches (including a hop away).

  3. Various broadcast discovery methods such as WD Discovery.

  4. Sending API requests on specific ports such as 80, 443, 8080 and 553.

  5. Sending SNMP requests to devices.

  6. Traditional port scanning of specific ports of interest.

All of these are scheduled intelligently to find a balance between responsiveness for a logged in user, background operation and ensuring there is no significant load on the network.

What range are scanned

The TetherBox will scan all these ranges automatically. If the TetherBox finds a device on any of these ranges, it will attempt to find an unused IP and join that network automatically:



Typical for Milesight and others

Typical for QVIS/Adata

Typical for Hikvision static IP 24

Typical for Older Hikvision / Dahua

Typical with wifi equipment

Typical with wifi equipment

Typical for Pelco,

Usually the default for many routers

The static range TetherX uses

Can other ranges be scanned?

Yes. If for example you add a camera that is on a network range that the TetherBox is not presently scanning, that range will automatically be scanned by the TetherBox going forward.

You can also specify additional network ranges to scan by opening your TetherBox offline interface and specifying the ranges there.


Please note in order for the TetherBox to be able to detect and monitor a device, it must be able to see the device's Hardware Address (MAC address).

If a network is set up to prevent this, or the device happens to be on the Internet, this will prevent automatic detection and reduce the monitoring capabilities.

Did this answer your question?