One feature I really liked from my old Xfinity router were the push notifications it sent when new devices first joined my wireless network. In this post we’re recreating that functionality on an OpenWRT access point/router with the Telegram API.


Create a Telegram bot

Creating a bot is super simple. First, start a converation with BotFather. He will guide you through creating a new bot!

Josh:       /newbot
BotFather:  Pick a name.
Josh:       My Bot
BotFather:  Pick a nickname.
Josh:       myBot
            Done! Congratulations on your new bot,
            Use this token to access the HTTP API:
            Keep your token secure, it can be used to control your bot.

Now create a group chat in the Telegram app and invited my new bot. To retrieve that group chat’s telegram “ID”, you can invoke getUpdates to see all active chats your bot is in (which should just be the single one you added it to). I use jq to parse out the appropriate value.

curl<YOUR_API_KEY_HERE>/getUpdates \
                                      | jq '.result[0]'


Without jq your response will look something like this:

  "ok": true,
  "result": [
      "update_id": 75757575,
      "message": {
        "message_id": 15,
        "from": {
          "is_bot": false,
          "first_name": "Josh",
        "chat": {
          "id": -4545454545,
          "title": "My Cool Group",
          "type": "group",
          "all_members_are_administrators": true
        "date": 1594511195,
        "new_chat_title": "My Cool Group"

Grab the relevant chat’s “id” value, which represents the CHAT_ID below, and you’ll have all the pieces you need to invoke the bot! We interact with a simple GET request formatted like below. Note the word “bot” preceding your API key.


The <YOUR_MSG> field can be anything url encoded. That’s the message you’ll receive in the telegram group chat from your bot.

Configure Your OpenWRT router

Install hostapd-utils

Thanks to this post, I found a really elegant way to to only run my script on an association (connect/disconnect) from my access point.

On your router, install the package hostapd-utils and configure it to run our script on each interface you’d like it to watch. For example if you have a guest SSID on the 2.4GHz band and your “main” SSID on both bands, you’ll have three interfaces you need to set up. Make sure to install hostapd-utils. The rest we will be wrapping into a script to run on each boot.

opkg install hostapd-utils

hostapd_cli -a/root/ -B -iwlan0
hostapd_cli -a/root/ -B -iwlan0-1
hostapd_cli -a/root/ -B -iwlan1


I have three scripts in total. (1) A script I run on each boot, (2) a script run on an association event to my access point, and (3) a script to manually run through all active associations. These scripts can be anywhere on your router. For this example, i’m placing the script in /root, naming them and, and

Boot Script

The boot script is run once on boot. We’re going to invoke our boot script from /etc/rc.local.


exit 0

This script alerts us that our router has restarted, and also sets up the connection events to listen for. Due to a race condition, I just simply sleep for 20 seconds before setting up the events. I then run to catch any associations i’ve missed in that 20 seconds.

Manual Script

This script simply loops through and fetches every MAC address currently associated with the AP. Then it checks against a local cache of “seen” MAC addresses. If the grep fails on that file, we first make an API call to to get a rough idea of the device. The first half of a (non-spoofed) MAC address indicates the device vendor! It will then send a Telegram message to my phone with the device’s information.

Event Script

This script will run when a device associates (or dissociates) with the access point. It is automatically called by hostapd through the setup we did in the boot script above. If it finds a match, it works just like the script above, logging the MAC in the shared cache and sending a Telegram message.

The script will now run each time a device starts talking with your AP. While not resiliant to MAC spoofing, it is a quick and easy way to keep an eye on new devices joining your networks :)