I tried that.... I was not smart enough to figure out the software. I did see at one point the IP trace leave my network and travel through my ISP.
Scanning 192.168.0.122 [65535 ports]
Discovered open port 10554/tcp on 192.168.0.122
Discovered open port 24010/tcp on 192.168.0.122
Discovered open port 24001/tcp on 192.168.0.122
Discovered open port 23000/tcp on 192.168.0.122
Discovered open port 24011/tcp on 192.168.0.122
Discovered open port 24000/tcp on 192.168.0.122
Completed SYN Stealth Scan at 14:56, 41.18s elapsed (65535 total ports)
Initiating Service scan at 14:56
Scanning 6 services on 192.168.0.122
Completed Service scan at 14:57, 39.11s elapsed (6 services on 1 host)
Initiating OS detection (try #1) against 192.168.0.122
NSE: Script scanning 192.168.0.122.
Initiating NSE at 14:57
Completed NSE at 14:57, 30.32s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.01s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Nmap scan report for 192.168.0.122
Host is up (0.058s latency).
Not shown: 65529 closed tcp ports (reset)
PORT STATE SERVICE VERSION
10554/tcp open rtsp
| fingerprint-strings:
| FourOhFourRequest, GenericLines, GetRequest:
| RTSP/1.0 551 Option not supported
|_ Cseq: 0
23000/tcp open tcpwrapped
24000/tcp open tcpwrapped
24001/tcp open tcpwrapped
24010/tcp open tcpwrapped
24011/tcp open tcpwrapped
This is the One IP I have working though
Blue iris on port 10554/tcp