Created
February 26, 2020 16:42
-
-
Save Fortyseven/aea6eb37ce12d300bb84afc241ed6fad to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:15:40 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
NTAG213 | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-A0AAALAF0tFQAEHl5C8WKB | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 41 30 41 41 41 4C 41 46 30 74 46 51 41 45 |q-A0AAALAF0tFQAE| | |
[20] 48 6C 35 43 38 57 4B 42 |Hl5C8WKB | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0x02FDF78335FB0DEA641583658833C623 | |
49522AF00B163592E32A0A2E31DADE2A | |
BFDB7D880DEB1D0FED72E9BB8C98DD08 | |
4FF2EACD997992DF6357BFC668821C49 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 41 30 41 41 41 4C 41 46 30 74 |AQBBq-A0AAALAF0t| | |
[20] 46 51 41 45 48 6C 35 43 38 57 4B 42 51 03 46 53 |FQAEHl5C8WKBQ.FS| | |
[30] 69 67 20 0B 02 00 40 02 FD F7 83 35 FB 0D EA 64 |ig [email protected]| | |
[40] 15 83 65 88 33 C6 23 49 52 2A F0 0B 16 35 92 E3 |..e.3.#IR*...5..| | |
[50] 2A 0A 2E 31 DA DE 2A BF DB 7D 88 0D EB 1D 0F ED |*..1..*..}......| | |
[60] 72 E9 BB 8C 98 DD 08 4F F2 EA CD 99 79 92 DF 63 |r......O....y..c| | |
[70] 57 BF C6 68 82 1C 49 00 |W..h..I. | | |
# NDEF Capability Container (CC): | |
Mapping version: 1.0 | |
Maximum NDEF data size: 144 bytes | |
NDEF access: Read-Only | |
E1 10 12 0F |.... | | |
-- EXTRA ------------------------------ | |
# Memory size: | |
144 bytes user memory | |
* 36 pages, with 4 bytes per page | |
# IC detailed information: | |
Full product name: NT2H1311G0DUx | |
Capacitance: 50 pF | |
# Version information: | |
Vendor ID: NXP | |
Type: NTAG | |
Subtype: 50 pF | |
Major version: 1 | |
Minor version: V0 | |
Storage size: 144 bytes | |
Protocol: ISO/IEC 14443-3 | |
# Configuration information: | |
ASCII mirror disabled | |
NFC counter: disabled | |
No limit on wrong password attempts | |
Strong load modulation disabled | |
Configuration locked | |
# Originality check: | |
Signature verified with NXP public key | |
-- FULL SCAN ------------------------------ | |
# Technologies supported: | |
ISO/IEC 14443-3 (Type A) compatible | |
ISO/IEC 14443-2 (Type A) compatible | |
# Android technology information: | |
Tag description: | |
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef] | |
* Maximum transceive length: 253 bytes | |
* Default maximum transceive time-out: 618 ms | |
# Detailed protocol information: | |
ID: 04:1E:5E:42:F1:62:81 | |
ATQA: 0x4400 | |
SAK: 0x00 | |
# Memory content: | |
[00] * 04:1E:5E CC (UID0-UID2, BCC0) | |
[01] * 42:F1:62:81 (UID3-UID6) | |
[02] * 50 48 FF FF (BCC1, INT, LOCK0-LOCK1) | |
[03] * E1:10:12:0F (OTP0-OTP3) | |
[04] * 03 78 91 01 |.x..| | |
[05] * 28 55 02 70 |(U.p| | |
[06] * 69 64 2E 6D |id.m| | |
[07] * 61 74 74 65 |atte| | |
[08] * 6C 2F 41 51 |l/AQ| | |
[09] * 42 42 71 2D |BBq-| | |
[0A] * 41 30 41 41 |A0AA| | |
[0B] * 41 4C 41 46 |ALAF| | |
[0C] * 30 74 46 51 |0tFQ| | |
[0D] * 41 45 48 6C |AEHl| | |
[0E] * 35 43 38 57 |5C8W| | |
[0F] * 4B 42 51 03 |KBQ.| | |
[10] * 46 53 69 67 |FSig| | |
[11] * 20 0B 02 00 | ...| | |
[12] * 40 02 FD F7 |@...| | |
[13] * 83 35 FB 0D |.5..| | |
[14] * EA 64 15 83 |.d..| | |
[15] * 65 88 33 C6 |e.3.| | |
[16] * 23 49 52 2A |#IR*| | |
[17] * F0 0B 16 35 |...5| | |
[18] * 92 E3 2A 0A |..*.| | |
[19] * 2E 31 DA DE |.1..| | |
[1A] * 2A BF DB 7D |*..}| | |
[1B] * 88 0D EB 1D |....| | |
[1C] * 0F ED 72 E9 |..r.| | |
[1D] * BB 8C 98 DD |....| | |
[1E] * 08 4F F2 EA |.O..| | |
[1F] * CD 99 79 92 |..y.| | |
[20] * DF 63 57 BF |.cW.| | |
[21] * C6 68 82 1C |.h..| | |
[22] * 49 00 FE 00 |I...| | |
[23] * 00 00 00 00 |....| | |
[24] * 00 00 00 00 |....| | |
[25] * 00 00 00 00 |....| | |
[26] * 00 00 00 00 |....| | |
[27] * 00 00 00 00 |....| | |
[28] * FF FF FF BD (LOCK2-LOCK4, CHK) | |
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0) | |
[2A] * 40 05 -- -- (ACCESS) | |
[2B] +P FF FF FF FF (PWD0-PWD3) | |
[2C] +P 00 00 -- -- (PACK0-PACK1) | |
*:locked & blocked, x:locked, | |
+:blocked, .:un(b)locked, ?:unknown | |
r:readable (write-protected), | |
p:password protected, -:write-only | |
P:password protected write-only | |
-------------------------------------- | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:16:40 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
NTAG213 | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-BwAAAHAFHvsAMEJsNaK2SB | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 42 77 41 41 41 48 41 46 48 76 73 41 4D 45 |q-BwAAAHAFHvsAME| | |
[20] 4A 73 4E 61 4B 32 53 42 |JsNaK2SB | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0x15C27FE81C3D8E3D9C1263339A305F79 | |
F3CC7098AF39A22C41CB6003EAABD607 | |
CCFE96AC5F5339C29510028431CF4D10 | |
048263C90C7A91D178F5D6D96608C283 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 42 77 41 41 41 48 41 46 48 76 |AQBBq-BwAAAHAFHv| | |
[20] 73 41 4D 45 4A 73 4E 61 4B 32 53 42 51 03 46 53 |sAMEJsNaK2SBQ.FS| | |
[30] 69 67 20 0B 02 00 40 15 C2 7F E8 1C 3D 8E 3D 9C |ig ...@.....=.=.| | |
[40] 12 63 33 9A 30 5F 79 F3 CC 70 98 AF 39 A2 2C 41 |.c3.0_y..p..9.,A| | |
[50] CB 60 03 EA AB D6 07 CC FE 96 AC 5F 53 39 C2 95 |.`........._S9..| | |
[60] 10 02 84 31 CF 4D 10 04 82 63 C9 0C 7A 91 D1 78 |...1.M...c..z..x| | |
[70] F5 D6 D9 66 08 C2 83 00 |...f.... | | |
# NDEF Capability Container (CC): | |
Mapping version: 1.0 | |
Maximum NDEF data size: 144 bytes | |
NDEF access: Read-Only | |
E1 10 12 0F |.... | | |
-- EXTRA ------------------------------ | |
# Memory size: | |
144 bytes user memory | |
* 36 pages, with 4 bytes per page | |
# IC detailed information: | |
Full product name: NT2H1311G0DUx | |
Capacitance: 50 pF | |
# Version information: | |
Vendor ID: NXP | |
Type: NTAG | |
Subtype: 50 pF | |
Major version: 1 | |
Minor version: V0 | |
Storage size: 144 bytes | |
Protocol: ISO/IEC 14443-3 | |
# Configuration information: | |
ASCII mirror disabled | |
NFC counter: disabled | |
No limit on wrong password attempts | |
Strong load modulation disabled | |
Configuration locked | |
# Originality check: | |
Signature verified with NXP public key | |
-- FULL SCAN ------------------------------ | |
# Technologies supported: | |
ISO/IEC 14443-3 (Type A) compatible | |
ISO/IEC 14443-2 (Type A) compatible | |
# Android technology information: | |
Tag description: | |
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef] | |
* Maximum transceive length: 253 bytes | |
* Default maximum transceive time-out: 618 ms | |
# Detailed protocol information: | |
ID: 04:26:C3:5A:2B:64:81 | |
ATQA: 0x4400 | |
SAK: 0x00 | |
# Memory content: | |
[00] * 04:26:C3 69 (UID0-UID2, BCC0) | |
[01] * 5A:2B:64:81 (UID3-UID6) | |
[02] * 94 48 FF FF (BCC1, INT, LOCK0-LOCK1) | |
[03] * E1:10:12:0F (OTP0-OTP3) | |
[04] * 03 78 91 01 |.x..| | |
[05] * 28 55 02 70 |(U.p| | |
[06] * 69 64 2E 6D |id.m| | |
[07] * 61 74 74 65 |atte| | |
[08] * 6C 2F 41 51 |l/AQ| | |
[09] * 42 42 71 2D |BBq-| | |
[0A] * 42 77 41 41 |BwAA| | |
[0B] * 41 48 41 46 |AHAF| | |
[0C] * 48 76 73 41 |HvsA| | |
[0D] * 4D 45 4A 73 |MEJs| | |
[0E] * 4E 61 4B 32 |NaK2| | |
[0F] * 53 42 51 03 |SBQ.| | |
[10] * 46 53 69 67 |FSig| | |
[11] * 20 0B 02 00 | ...| | |
[12] * 40 15 C2 7F |@...| | |
[13] * E8 1C 3D 8E |..=.| | |
[14] * 3D 9C 12 63 |=..c| | |
[15] * 33 9A 30 5F |3.0_| | |
[16] * 79 F3 CC 70 |y..p| | |
[17] * 98 AF 39 A2 |..9.| | |
[18] * 2C 41 CB 60 |,A.`| | |
[19] * 03 EA AB D6 |....| | |
[1A] * 07 CC FE 96 |....| | |
[1B] * AC 5F 53 39 |._S9| | |
[1C] * C2 95 10 02 |....| | |
[1D] * 84 31 CF 4D |.1.M| | |
[1E] * 10 04 82 63 |...c| | |
[1F] * C9 0C 7A 91 |..z.| | |
[20] * D1 78 F5 D6 |.x..| | |
[21] * D9 66 08 C2 |.f..| | |
[22] * 83 00 FE 00 |....| | |
[23] * 00 00 00 00 |....| | |
[24] * 00 00 00 00 |....| | |
[25] * 00 00 00 00 |....| | |
[26] * 00 00 00 00 |....| | |
[27] * 00 00 00 00 |....| | |
[28] * FF FF FF BD (LOCK2-LOCK4, CHK) | |
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0) | |
[2A] * 40 05 -- -- (ACCESS) | |
[2B] +P FF FF FF FF (PWD0-PWD3) | |
[2C] +P 00 00 -- -- (PACK0-PACK1) | |
*:locked & blocked, x:locked, | |
+:blocked, .:un(b)locked, ?:unknown | |
r:readable (write-protected), | |
p:password protected, -:write-only | |
P:password protected write-only | |
-------------------------------------- | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:20 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
NTAG213 | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E| | |
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0xBBE4BA7DF8BAAD953AB84D50093EA2B2 | |
96FF801D40B7F4D15B0BB6963522D7E8 | |
16D11924EE5912959FCEDAF4141E09CF | |
AE09A0EB2861EFF785D9793FA9E5A7C5 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06| | |
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS| | |
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:| | |
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[| | |
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...| | |
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...| | |
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... | | |
# NDEF Capability Container (CC): | |
Mapping version: 1.0 | |
Maximum NDEF data size: 144 bytes | |
NDEF access: Read-Only | |
E1 10 12 0F |.... | | |
-- EXTRA ------------------------------ | |
# Memory size: | |
144 bytes user memory | |
* 36 pages, with 4 bytes per page | |
# IC detailed information: | |
Full product name: NT2H1311G0DUx | |
Capacitance: 50 pF | |
# Version information: | |
Vendor ID: NXP | |
Type: NTAG | |
Subtype: 50 pF | |
Major version: 1 | |
Minor version: V0 | |
Storage size: 144 bytes | |
Protocol: ISO/IEC 14443-3 | |
# Configuration information: | |
ASCII mirror disabled | |
NFC counter: disabled | |
No limit on wrong password attempts | |
Strong load modulation disabled | |
Configuration locked | |
# Originality check: | |
Signature verified with NXP public key | |
-- FULL SCAN ------------------------------ | |
# Technologies supported: | |
ISO/IEC 14443-3 (Type A) compatible | |
ISO/IEC 14443-2 (Type A) compatible | |
# Android technology information: | |
Tag description: | |
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef] | |
* Maximum transceive length: 253 bytes | |
* Default maximum transceive time-out: 618 ms | |
# Detailed protocol information: | |
ID: 04:7E:90:52:2B:64:80 | |
ATQA: 0x4400 | |
SAK: 0x00 | |
# Memory content: | |
[00] * 04:7E:90 62 (UID0-UID2, BCC0) | |
[01] * 52:2B:64:80 (UID3-UID6) | |
[02] * 9D 48 FF FF (BCC1, INT, LOCK0-LOCK1) | |
[03] * E1:10:12:0F (OTP0-OTP3) | |
[04] * 03 78 91 01 |.x..| | |
[05] * 28 55 02 70 |(U.p| | |
[06] * 69 64 2E 6D |id.m| | |
[07] * 61 74 74 65 |atte| | |
[08] * 6C 2F 41 51 |l/AQ| | |
[09] * 42 42 71 2D |BBq-| | |
[0A] * 42 54 41 41 |BTAA| | |
[0B] * 41 45 41 46 |AEAF| | |
[0C] * 30 36 6F 2D |06o-| | |
[0D] * 38 45 66 70 |8Efp| | |
[0E] * 42 53 4B 32 |BSK2| | |
[0F] * 53 41 51 03 |SAQ.| | |
[10] * 46 53 69 67 |FSig| | |
[11] * 20 0B 02 00 | ...| | |
[12] * 40 BB E4 BA |@...| | |
[13] * 7D F8 BA AD |}...| | |
[14] * 95 3A B8 4D |.:.M| | |
[15] * 50 09 3E A2 |P.>.| | |
[16] * B2 96 FF 80 |....| | |
[17] * 1D 40 B7 F4 |.@..| | |
[18] * D1 5B 0B B6 |.[..| | |
[19] * 96 35 22 D7 |.5".| | |
[1A] * E8 16 D1 19 |....| | |
[1B] * 24 EE 59 12 |$.Y.| | |
[1C] * 95 9F CE DA |....| | |
[1D] * F4 14 1E 09 |....| | |
[1E] * CF AE 09 A0 |....| | |
[1F] * EB 28 61 EF |.(a.| | |
[20] * F7 85 D9 79 |...y| | |
[21] * 3F A9 E5 A7 |?...| | |
[22] * C5 00 FE 00 |....| | |
[23] * 00 00 00 00 |....| | |
[24] * 00 00 00 00 |....| | |
[25] * 00 00 00 00 |....| | |
[26] * 00 00 00 00 |....| | |
[27] * 00 00 00 00 |....| | |
[28] * FF FF FF BD (LOCK2-LOCK4, CHK) | |
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0) | |
[2A] * 40 05 -- -- (ACCESS) | |
[2B] +P FF FF FF FF (PWD0-PWD3) | |
[2C] +P 00 00 -- -- (PACK0-PACK1) | |
*:locked & blocked, x:locked, | |
+:blocked, .:un(b)locked, ?:unknown | |
r:readable (write-protected), | |
p:password protected, -:write-only | |
P:password protected write-only | |
-------------------------------------- | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:48 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
MIFARE Ultralight (unknown type) (MF0ICU1) | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E| | |
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0xBBE4BA7DF8BAAD953AB84D50093EA2B2 | |
96FF801D40B7F4D15B0BB6963522D7E8 | |
16D11924EE5912959FCEDAF4141E09CF | |
AE09A0EB2861EFF785D9793FA9E5A7C5 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06| | |
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS| | |
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:| | |
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[| | |
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...| | |
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...| | |
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... | | |
# NDEF Capability Container (CC): | |
Mapping version: 1.0 | |
Maximum NDEF data size: 144 bytes | |
NDEF access: Read-Only | |
E1 10 12 0F |.... | | |
-- EXTRA ------------------------------ | |
# Memory information: | |
64 bytes total memory | |
* 16 pages, with 4 bytes per page | |
* 48 bytes user memory (12 pages) | |
Memory is locked | |
-- FULL SCAN ------------------------------ | |
-------------------------------------- | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:18:19 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
NTAG213 | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E| | |
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0xBBE4BA7DF8BAAD953AB84D50093EA2B2 | |
96FF801D40B7F4D15B0BB6963522D7E8 | |
16D11924EE5912959FCEDAF4141E09CF | |
AE09A0EB2861EFF785D9793FA9E5A7C5 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06| | |
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS| | |
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:| | |
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[| | |
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...| | |
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...| | |
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... | | |
# NDEF Capability Container (CC): | |
Mapping version: 1.0 | |
Maximum NDEF data size: 144 bytes | |
NDEF access: Read-Only | |
E1 10 12 0F |.... | | |
-- EXTRA ------------------------------ | |
# Memory size: | |
144 bytes user memory | |
* 36 pages, with 4 bytes per page | |
# IC detailed information: | |
Full product name: NT2H1311G0DUx | |
Capacitance: 50 pF | |
# Version information: | |
Vendor ID: NXP | |
Type: NTAG | |
Subtype: 50 pF | |
Major version: 1 | |
Minor version: V0 | |
Storage size: 144 bytes | |
Protocol: ISO/IEC 14443-3 | |
# Configuration information: | |
ASCII mirror disabled | |
NFC counter: disabled | |
No limit on wrong password attempts | |
Strong load modulation disabled | |
Configuration locked | |
# Originality check: | |
Signature verified with NXP public key | |
-- FULL SCAN ------------------------------ | |
# Technologies supported: | |
ISO/IEC 14443-3 (Type A) compatible | |
ISO/IEC 14443-2 (Type A) compatible | |
# Android technology information: | |
Tag description: | |
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef] | |
* Maximum transceive length: 253 bytes | |
* Default maximum transceive time-out: 618 ms | |
# Detailed protocol information: | |
ID: 04:7E:90:52:2B:64:80 | |
ATQA: 0x4400 | |
SAK: 0x00 | |
# Memory content: | |
[00] * 04:7E:90 62 (UID0-UID2, BCC0) | |
[01] * 52:2B:64:80 (UID3-UID6) | |
[02] * 9D 48 FF FF (BCC1, INT, LOCK0-LOCK1) | |
[03] * E1:10:12:0F (OTP0-OTP3) | |
[04] * 03 78 91 01 |.x..| | |
[05] * 28 55 02 70 |(U.p| | |
[06] * 69 64 2E 6D |id.m| | |
[07] * 61 74 74 65 |atte| | |
[08] * 6C 2F 41 51 |l/AQ| | |
[09] * 42 42 71 2D |BBq-| | |
[0A] * 42 54 41 41 |BTAA| | |
[0B] * 41 45 41 46 |AEAF| | |
[0C] * 30 36 6F 2D |06o-| | |
[0D] * 38 45 66 70 |8Efp| | |
[0E] * 42 53 4B 32 |BSK2| | |
[0F] * 53 41 51 03 |SAQ.| | |
[10] * 46 53 69 67 |FSig| | |
[11] * 20 0B 02 00 | ...| | |
[12] * 40 BB E4 BA |@...| | |
[13] * 7D F8 BA AD |}...| | |
[14] * 95 3A B8 4D |.:.M| | |
[15] * 50 09 3E A2 |P.>.| | |
[16] * B2 96 FF 80 |....| | |
[17] * 1D 40 B7 F4 |.@..| | |
[18] * D1 5B 0B B6 |.[..| | |
[19] * 96 35 22 D7 |.5".| | |
[1A] * E8 16 D1 19 |....| | |
[1B] * 24 EE 59 12 |$.Y.| | |
[1C] * 95 9F CE DA |....| | |
[1D] * F4 14 1E 09 |....| | |
[1E] * CF AE 09 A0 |....| | |
[1F] * EB 28 61 EF |.(a.| | |
[20] * F7 85 D9 79 |...y| | |
[21] * 3F A9 E5 A7 |?...| | |
[22] * C5 00 FE 00 |....| | |
[23] * 00 00 00 00 |....| | |
[24] * 00 00 00 00 |....| | |
[25] * 00 00 00 00 |....| | |
[26] * 00 00 00 00 |....| | |
[27] * 00 00 00 00 |....| | |
[28] * FF FF FF BD (LOCK2-LOCK4, CHK) | |
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0) | |
[2A] * 40 05 -- -- (ACCESS) | |
[2B] +P FF FF FF FF (PWD0-PWD3) | |
[2C] +P 00 00 -- -- (PACK0-PACK1) | |
*:locked & blocked, x:locked, | |
+:blocked, .:un(b)locked, ?:unknown | |
r:readable (write-protected), | |
p:password protected, -:write-only | |
P:password protected write-only | |
-------------------------------------- | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:06 ** | |
Report Type: External | |
-- IC INFO ------------------------------ | |
# IC manufacturer: | |
NXP Semiconductors | |
# IC type: | |
NTAG213 | |
# NFC Forum NDEF-compliant tag: | |
Type 2 Tag | |
-- NDEF ------------------------------ | |
# NFC data set information: | |
NDEF message containing 2 records | |
Current message size: 120 bytes | |
Maximum message size: 120 bytes | |
NFC data set access: Read-Only | |
# Record #1: URI record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "U" | |
protocol field: https://www. | |
URI field: pid.mattel/AQBBq-B0AAAEAF041M8E872Ke2OA | |
Payload length: 40 bytes | |
Payload data: | |
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB| | |
[10] 71 2D 42 30 41 41 41 45 41 46 30 34 31 4D 38 45 |q-B0AAAEAF041M8E| | |
[20] 38 37 32 4B 65 32 4F 41 |872Ke2OA | | |
# Record #2: Signature record: | |
Type Name Format: NFC Forum well-known type | |
Short Record | |
type: "Sig" | |
Version: 2.0 | |
Signature type: ECDSA P256 | |
Hash type: SHA-256 | |
Signature data: (64 bytes) | |
0xCE77B63A9AA1AC70EF7BFF6758305D39 | |
063597E80AA006FCC7C9E0076B0F91D5 | |
9B316157B07DA2A201BD948860E8A5D4 | |
063F165CEA6E416733A0BCA45A464FF6 | |
Certificate chain containing 0 certificates | |
Certificate type: X.509 | |
Certificate URI: | |
Error parsing NDEF record | |
# NDEF message: | |
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/| | |
[10] 41 51 42 42 71 2D 42 30 41 41 41 45 41 46 30 34 |AQBBq-B0AAAEAF04| | |
[20] 31 4D 38 45 38 37 32 4B 65 32 4F 41 51 03 46 53 |1M8E872Ke2OAQ.FS| | |
[30] 69 67 20 0B 02 00 40 CE 77 B6 3A 9A A1 AC 70 EF |ig [email protected].:...p.| | |
[40] 7B FF 67 58 30 5D 39 06 35 97 E8 0A A0 06 FC C7 |{.gX0]9.5.......| | |
[50] C9 E0 07 6B 0F 91 D5 9B 31 61 57 B0 7D A2 A2 01 |...k....1aW.}...| | |
[60] BD 94 88 60 E8 A5 D4 06 3F 16 5C EA 6E 41 67 33 |...`....?.\.nAg3| | |
[70] A0 BC A4 5A 46 4F F6 00 |...ZFO.. | | |
-- EXTRA ------------------------------ | |
# Memory size: | |
144 bytes user memory | |
* 36 pages, with 4 bytes per page | |
# IC detailed information: | |
Full product name: NT2H1311G0DUx | |
Capacitance: 50 pF | |
# Version information: | |
Vendor ID: NXP | |
Type: NTAG | |
Subtype: 50 pF | |
Major version: 1 | |
Minor version: V0 | |
Storage size: 144 bytes | |
Protocol: ISO/IEC 14443-3 | |
# Originality check: | |
Signature verified with NXP public key | |
-- FULL SCAN ------------------------------ | |
# Technologies supported: | |
ISO/IEC 14443-3 (Type A) compatible | |
ISO/IEC 14443-2 (Type A) compatible | |
# Android technology information: | |
Tag description: | |
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef] | |
* Maximum transceive length: 253 bytes | |
* Default maximum transceive time-out: 618 ms | |
# Detailed protocol information: | |
ID: 04:F3:BD:8A:7B:63:80 | |
ATQA: 0x4400 | |
SAK: 0x00 | |
-------------------------------------- | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment