DEV Community

Cover image for The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth
Dayvid Kelly (Dayvid)
Dayvid Kelly (Dayvid)

Posted on

The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth

Smart home devices promise convenience, entertainment, and a more connected lifestyle. But my recent experience with an Android-based projector exposed a less visible side of this technology—one that quietly consumes bandwidth, generates hidden advertising revenue, and potentially opens the door to unknown third parties inside your home network.

What began as a routine network check turned into a full digital autopsy, revealing a pattern of behavior that most consumers never see—and that many manufacturers never disclose.

projector's home screen


How the Investigation Started

I run AdGuard Home on my local network to monitor and filter DNS requests from all connected devices. One evening, I opened the query log to troubleshoot slow network activity. Instead of normal traffic patterns, I discovered something unusual.

My projector—identified as 192.168.100.3 (Projector Android)—was making hundreds of DNS requests every hour.

But not to the services you’d expect from a streaming device. These requests were going to:

  • pornographic websites
  • adult ad networks
  • shady tracking domains
  • click-fraud infrastructure
  • foreign servers with no connection to any installed apps

Found porn query

Every single request originated from the projector, even when it was idle.

Unrequested queries


A Pattern of Automated Porn and Ad Traffic

The logs showed constant attempts to access domains such as:

  • jizzbunker.com
  • porntire.com
  • yescams.com
  • discretxxx.com
  • hotmoza.tv
  • bbs.airav.cc
  • various .xxx, .cc, .tv adult networks

This traffic was:

  • automated
  • repetitive
  • occurring at all hours
  • unrelated to any user activity

AdGuard’s parental control filter blocked these domains, but the behavior itself was alarming.

This wasn’t accidental browsing. It wasn’t caused by a user misclick.
This was a background process built into the projector’s software, calling home to ad networks and content providers without consent or awareness.


What This Means: Adware at the Firmware Level

Cheap Android projectors often run heavily modified versions of Android. Many of these ROM builds include:

  • preinstalled “free movie” or “TV” apps
  • hidden ad SDKs
  • forced web traffic to generate advertising impressions
  • data-harvesting services
  • remote command-and-control channels

In my case, the projector appeared to be doing the following:

  1. Generating ad calls to porn sites to create revenue for unknown third parties.
  2. Contacting ad and tracking networks likely embedded into preinstalled apps.
  3. Initiating background traffic even when unused, consuming bandwidth.
  4. Possibly exposing the local network to outside access through questionable services.

When a device sends automated porn traffic in the background, it is not a “bug.”
It is monetization through hidden adware, installed at the factory level.


Why This Is Dangerous

These behaviors carry several risks:

1. Bandwidth theft

The device silently consumes your internet connection to run unsolicited activities.

2. Exposure to unsafe networks

Malicious domains may download additional payloads or link to command servers.

3. Privacy invasion

Your network activity becomes intertwined with adult traffic you never generated.

4. Vulnerability to remote access

Some cheap Android devices include backdoors that allow external control.

5. Potential legal implications

If unfiltered, this traffic looks like intentional access to illegal websites.


How to Verify If Your Smart Devices Are Affected

If you own an Android-based projector, TV box, or budget streaming device, you can test it yourself:

  1. Install AdGuard Home, Pi-hole, or similar DNS filtering software.
  2. Let it run for a few hours with the device connected.
  3. Check the query log for unusual patterns:
  • porn sites
  • ad networks
  • foreign domains
  • unknown tracking services
    1. Reboot the device and watch if traffic resumes immediately.
    2. Factory reset the device and check if the behavior persists.
    3. Remove or disable suspicious preinstalled apps.
    4. If possible, isolate the device on a separate VLAN or guest network.

If the logs continue after a reset, the behavior is likely baked into the firmware.


What Manufacturers Don’t Tell You

Ultra-cheap Android projectors and TV boxes often come from factories that subsidize hardware costs by preinstalling:

  • adware
  • click-fraud bots
  • tracking frameworks
  • third-party revenue-generating services

This is why some devices are significantly cheaper than branded alternatives.
The real product isn't the projector—it’s your network, your data, and your bandwidth.


What Consumers Should Do

Until stricter regulations force transparency in IoT devices, consumers can protect themselves by:

  • Avoiding no-brand Android projectors and TV boxes
  • Using DNS filtering (AdGuard Home, Pi-hole)
  • Isolating IoT devices on separate networks
  • Monitoring traffic regularly
  • Favoring reputable manufacturers with audited firmware

Your projector should never secretly browse adult sites on its own.
It should never contact dozens of unknown servers per minute.
And it should never consume your bandwidth without permission.


Conclusion

This investigation revealed a disturbing truth hiding in plain sight:
A smart device inside my home was not just projecting movies—it was participating in an underground ecosystem of ad fraud, bandwidth abuse, and unsolicited adult traffic.

If this can happen in a projector, it can happen in any smart device.

Consumers deserve transparency.
They deserve security.
And they deserve hardware that doesn’t turn their home network into a silent revenue stream for unknown entities.

Until that changes, awareness is our strongest defense.

Top comments (0)