Skip to content

SPP Probe

tools/spp_probe.py scans RFCOMM channels 1 through 30 to identify which ones the NCH700 accepts connections on.

Terminal window
python tools/spp_probe.py

The tool attempts a Bluetooth RFCOMM connection to each channel with a 2-second timeout. For each channel it reports the connection status: CONNECTED, timeout, refused, or host down. If the channel sends any initial data on connect, the tool captures and displays it.

After scanning all channels, it prints a summary of all open channels.

The NCH700 accepts connections on the following channels:

ChannelNotes
8Open, no initial data
9Open, no initial data
14Open, sends initial ff55 data
20Open, no initial data
21Open, no initial data
25Open, no initial data
27Open, sends initial fe03 data
29Open, no initial data
30Open, no initial data

Channels 14 and 27 are the most interesting because they send unsolicited data on connection, indicating active protocol endpoints.

This was the first tool used in the research to discover which channels the NCH700 exposes. Run it immediately after pairing — channel 14 may only be available on the first connection after a power cycle.