Stephanie,
Assuming those are all the open ports you may want to simply change the port in the script like I have listed in post #23. I don't know what you used to scan it, I am using MobaXterm on Windows and scanning the ASIAIR Pro with the stock ASIAIR_PRO_OS_V1.4.zip from their site and see the following open ports
FIRMWARE 4.35
- Port #22 (ssh): listening
- Port #139 (netbios-ssn): listening
- Port #445 (microsoft-ds): listening
- Port #4030: listening
- Port #4040: listening
- Port #4350: listening
- Port #4360: listening
- Port #4400: listening
- Port #4500: listening
- Port #4700: listening
- Port #4800: listening
- Port #8888: listening
What is inserting with the newer update they have the following ports open
FIRMWARE 10.74
- Port #22 (ssh): listening
- Port #139 (netbios-ssn): listening
- Port #445 (microsoft-ds): listening
- Port #4030: listening
- Port #4040: listening
- Port #4350: listening
- Port #4360: listening
- Port #4400: listening
- Port #4500: listening
- Port #4700: listening
- Port #4800: listening
- Port #4801: listening
- Port #8888: listening
What I wanted to share in this post was the history command from the stock ASIAIR_PRO_OS_V1.4.zip image.
Dear Viking1,
Thanks to have take the time to respond. I have no doubt that all you describe is functionnal on ASIAIR Pro.
Unfortunately, I guess there is a misunderstanding in the subject of this treat. This treat is talking about Seestar S50 from ZWO, which is a complete scope based partially on ASIAIR ... but this particular scope does not have a complete ASIAIR inside !! So, the answers that has yet been written does not respond to the users like me, owning a Seestar and not an ASIAIR. The jailbreak created was done for the Seestar (and I have no doubt that it may work also on ASIAIR), but as the scope software has been restricted in the functionalyties, some ports have been closed by ZWO to avoid us to play "underground" ... I try to find another solution to jailbreak it.
Kind regards,
Stephane.