from: 1135969888 to: 2224831024 channel: 8 decoded { portnum: NODEINFO_APP request_id: 875168392 bitfield: 1 } id: 3979585696 rx_time: 1754539123 rx_snr: -7.5 hop_limit: 7 rx_rssi: -101 hop_start: 7 relay_node: 96
id: "!43b58660" long_name: "Big Chicken Attacks" short_name: "🐔" macaddr: "H\312C\265\206`" hw_model: HELTEC_V3 public_key: "v\307\246XQ\"\222\321\022Cu\003Qy\341\220xL@\030\200\3151\002\233\250\322\017\300>\355\014"
from: 2224780928 to: 2224831024 decoded { portnum: NODEINFO_APP request_id: 2156576982 bitfield: 1 } id: 1877861808 rx_time: 1752477630 rx_snr: 1.25 hop_limit: 5 rx_rssi: -96 hop_start: 7 relay_node: 103
id: "!849b7680" long_name: "WetAndMeshy" short_name: "7680" macaddr: "\260\201\204\233v\200" hw_model: HELTEC_V3 public_key: "\025\275E\255!`\027\210\211)\233P\214\273v_t\t\267\266\323c\304M3<;h\237\303\336?"
from: 1128178900 to: 2224831024 decoded { portnum: NODEINFO_APP request_id: 482483840 bitfield: 0 } id: 432904371 rx_time: 1752373202 rx_snr: -3.25 hop_limit: 2 rx_rssi: -102 hop_start: 7 relay_node: 144
id: "!433ea4d4" long_name: "DGtlRift a4d4" short_name: "a4d4" macaddr: "H\312C>\244\324" hw_model: HELTEC_V3 public_key: "\346\303\013\255\262\241J8m\336\013\277\003\t\324Ef\375\327\003d\205\215\230\000\301\227y\231\261\316\'"
from: 1135969888 to: 2224831024 decoded { portnum: NODEINFO_APP request_id: 201392966 bitfield: 1 } id: 355327494 rx_time: 1750834251 rx_snr: -9.75 hop_limit: 6 rx_rssi: -108 hop_start: 7 relay_node: 144
id: "!43b58660" long_name: "Big Chicken Attacks" short_name: "BCA" macaddr: "H\312C\265\206`" hw_model: HELTEC_V3 public_key: "v\307\246XQ\"\222\321\022Cu\003Qy\341\220xL@\030\200\3151\002\233\250\322\017\300>\355\014"