3 years ago I had asked if anyone knew of or could create an integration for HE for the Victor Smart Kill mouse and rat traps. @snell responded, but I couldn’t get any information off the trap aside from serial and IP address.
However, I just came across this which intercepts information through a browser. It works as I retrieved all my trap information from the Victor server.
Here’s a link to the simple page which authenticates and retrieves the info.
https://n-wach.github.io/victor-trap-monitor/
Is there some way to “easily” take this information and create a HE notification? I’m looking to integrate this into Echo Speaks to announce it through my house. Hopefully there’s something already out there that could allow me to plug in my credentials, look to a server and parse out the portion which is triggered and alert HE. Unfortunately, I’m clueless at coding for HE.
Background: I have a shed near woods as well as a Prius that mice keep getting into my LIon battery and blower motors (had to disassemble the car to get at them…) I’m also deathly allergic to these guys.
Here’s the info pulled from my login with redactions:
mousekiller
Last updated: 10/20/2024, 11:27:14 AM
Battery: 81%
Kills present: 1
Raw JSON
{ "id": 136**, "url": "https://www.victorsmartkill.com/traps/136**/", "corruption_status": 0, "operator": null, "name": "mousekiller", "ssid": "****", "serial_number": "WM17****", "auto_upgrade": false, "status": 0, "location": "https://www.victorsmartkill.com/locations/*****/", "lat": "****", "long": "*****", "upgrade_firmware": null, "commercial_gateway": null, "commercial_monitor_mode_enabled": false, "lorawan_app_key": "****", "floor_plan_x": 0, "floor_plan_y": 0, "room": null, "trap_type": 2, "trap_type_verbose": "Mouse Trap", "alerts": 279614, "trapstatistics": { "id": 13600, "url": "https://www.victorsmartkill.com/trapstatistics/13600/", "trap": "https://www.victorsmartkill.com/traps/13600/", "trap_name": "mousekiller", "kills_present": 1, "install_date": "2024-08-21T20:09:10.499513Z", "owner_name": "*****", "owner_email": "****", "last_report_date": "2024-10-20T15:27:14.125903Z", "last_kill_date": "2024-10-20T07:27:47.051850Z", "temperature": 258, "battery_level": 81, "total_kills": 6, "total_escapes": null, "rx_power_level": -26, "firmware_version": "1.3.2", "trap_provisioned": true, "last_sequence_number": null, "total_retreats": null, "wireless_network_rssi": -26, "error_code": 0, "send_conn_lost_nt": true, "send_empty_trap_nt": false, "board_type": "WEMT", "last_maintenance_date": "No maintenance records exist.", "bait_level": null, "current_bait": null, "last_bait_quantity": null } }
Also, it appears the person who originally figured out how to intercept this information built a Home Assistant version (I’m no longer running HA):