Links to help me monitor my Zeverlution PV converter locally
Posted by jpluimers on 2018/12/18
Since it’s my data, I’d rather be in control myself, so here are some links that will help me going around the Zevercloud solution I posted about yesterday.
- Raspberry Pi based:
- Parse RS485 data
- eversolar-monitor/Introduction.md at wiki · solmoller/eversolar-monitor (including suitable RS485 hardware)
- solmoller/eversolar-monitor: Script to capture data and create statistics from Eversolar/zeversolar Solar Inverters. Includes easy install image files for Raspberry Pi. Working edition since 2012 :-)
- Upload to Domoticz · Issue #14 · solmoller/eversolar-monitor
- Some merges still need to be done: Network Graph · solmoller/eversolar-monitor
- In case of connection trouble:
- The above started out as this:
- eversolar-monitor/Introduction.md at wiki · solmoller/eversolar-monitor (including suitable RS485 hardware)
- Parse Zeverlution web-server
- Parse RS485 data
- Arduino based:
Some other interesting links of software supporting Zeversolar devices:
Note that PVoutput.org does have native ZeverCloud updating using the ZeverSolar API key:
- [WayBack] Zeversolar auto Updater – Auto Uploader – PVOutput Community
- [WayBack] 2017-04-20 Zevercloud Auto Uploader – What’s New – PVOutput Community
But these might help me:
- [WayBack] GitHub – solmoller/eversolar-monitor: Script to capture data and create statistics from Eversolar/zeversolar Solar Inverters. Includes easy install image files for Raspberry Pi. Working edition since 2012 :-)
- [WayBack] GitHub – smeyn/ZeverSolar: Python reader from a Zever Solar web server
- [WayBack] Zeversolar pv inverter – Domoticz
- [Archive.is] Zeversolar auto Updater – Auto Uploader / Zevercloud – PVOutput Community
- https://www.dropbox.com/s/noya0yaf9suxs59/Solarcloud-API-guide_En_v20141114.pdf?dl=0
- [WayBack] PV statistics for ROI | Steve’s Blog
- [Archive.is] FAQ – Zeversolar
- of which I already bumped into
[WayBack] Jeroen Pluimers on Twitter: “We are sort of lucky: The @Zeversolar 3860 problem was cabling; one of the connectors had come loose, dropped to the ground, got moist and had a bit of DC current earth leaking. The safety mechanism in the converter found this, hence Error Code 38: … 1/2”[WayBack] Jeroen Pluimers on Twitter: “This must have happened between sunset and sunrise, where also the lightning strike happened. All connectors have been re-fastened on 60 cm height. If this ever happens again, I know what to check first. 2/2”
Error Code 38:
- Check the PV array’s insulation to ground and make sure that the insulation resistance to ground is greater than 1 MOhm. Otherwise, make a visual inspection of all PV cables and modules.
- Make sure the grounding connection of the inverter is reliable. If this fault occurs often, contact the service.
- of which I already bumped into
–jeroen
nmap output of my Zeverlution 3680: unlike documentation at for instance [WayBack] Zeverlution_Inverter_Installation_and_Operating_Instructions.pdf (which specifies ports 80 and 6655), the open ports are 80 and 6677:
Starting Nmap 7.50 ( https://nmap.org ) at 2017-07-08 20:54 CEST
NSE: Loaded 144 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 20:54
Completed NSE at 20:54, 0.00s elapsed
Initiating NSE at 20:54
Completed NSE at 20:54, 0.00s elapsed
Initiating ARP Ping Scan at 20:54
Scanning 192.168.71.85 [1 port]
Completed ARP Ping Scan at 20:54, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:54
Completed Parallel DNS resolution of 1 host. at 20:54, 0.01s elapsed
Initiating SYN Stealth Scan at 20:54
Scanning 192.168.71.85 [65535 ports]
Discovered open port 80/tcp on 192.168.71.85
Increasing send delay for 192.168.71.85 from 0 to 5 due to 43 out of 142 dropped probes since last increase.
SYN Stealth Scan Timing: About 3.69% done; ETC: 21:08 (0:13:29 remaining)
SYN Stealth Scan Timing: About 7.99% done; ETC: 21:07 (0:11:42 remaining)
SYN Stealth Scan Timing: About 12.29% done; ETC: 21:06 (0:10:49 remaining)
SYN Stealth Scan Timing: About 16.60% done; ETC: 21:06 (0:10:08 remaining)
SYN Stealth Scan Timing: About 20.90% done; ETC: 21:06 (0:09:31 remaining)
Discovered open port 6677/tcp on 192.168.71.85
SYN Stealth Scan Timing: About 25.65% done; ETC: 21:06 (0:08:53 remaining)
SYN Stealth Scan Timing: About 30.77% done; ETC: 21:06 (0:08:15 remaining)
SYN Stealth Scan Timing: About 35.93% done; ETC: 21:06 (0:07:36 remaining)
SYN Stealth Scan Timing: About 41.06% done; ETC: 21:06 (0:06:59 remaining)
SYN Stealth Scan Timing: About 46.19% done; ETC: 21:06 (0:06:22 remaining)
SYN Stealth Scan Timing: About 51.33% done; ETC: 21:06 (0:05:45 remaining)
Increasing send delay for 192.168.71.85 from 5 to 10 due to max_successful_tryno increase to 4
SYN Stealth Scan Timing: About 56.82% done; ETC: 21:06 (0:05:08 remaining)
SYN Stealth Scan Timing: About 61.97% done; ETC: 21:06 (0:04:31 remaining)
SYN Stealth Scan Timing: About 67.05% done; ETC: 21:06 (0:03:55 remaining)
SYN Stealth Scan Timing: About 72.10% done; ETC: 21:06 (0:03:19 remaining)
SYN Stealth Scan Timing: About 77.17% done; ETC: 21:06 (0:02:43 remaining)
SYN Stealth Scan Timing: About 82.34% done; ETC: 21:06 (0:02:06 remaining)
SYN Stealth Scan Timing: About 87.52% done; ETC: 21:06 (0:01:29 remaining)
SYN Stealth Scan Timing: About 92.67% done; ETC: 21:06 (0:00:52 remaining)
Completed SYN Stealth Scan at 21:06, 708.90s elapsed (65535 total ports)
Initiating Service scan at 21:06
Scanning 2 services on 192.168.71.85
Completed Service scan at 21:08, 146.11s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.71.85
NSE: Script scanning 192.168.71.85.
Initiating NSE at 21:08
Completed NSE at 21:09, 7.13s elapsed
Initiating NSE at 21:09
Completed NSE at 21:09, 1.01s elapsed
Nmap scan report for 192.168.71.85
Host is up (0.0015s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE VERSION
80/tcp open tcpwrapped
|_http-title: Site doesn't have a title (text/html).
6677/tcp open unknown
MAC Address: EA:B9:61:00:00:00 (Unknown)
Device type: specialized
Running: Rigol Technologies embedded
OS details: Rigol DS1000Z-series oscilloscope
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE
HOP RTT ADDRESS
1 1.48 ms 192.168.71.85
NSE: Script Post-scanning.
Initiating NSE at 21:09
Completed NSE at 21:09, 0.00s elapsed
Initiating NSE at 21:09
Completed NSE at 21:09, 0.00s elapsed
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 865.29 seconds
Raw packets sent: 65714 (2.892MB) | Rcvd: 65769 (2.640MB)






Leave a comment