Skip to content

We're upgrading our operations to serve you better. Orders ship as usual from Laval, QC. Questions? Contact us

Bitcoin accepted at checkout  |  Ships from Laval, QC, Canada  |  Expert support since 2016

BITAXE_IOS_401 Info

Bitaxe – iOS 401 Authentication Error on AxeOS Dashboard

iOS Safari (or any iOS browser) returns 401 Unauthorized when accessing the AxeOS dashboard at http://<bitaxe-ip>/ — even though AxeOS implements no HTTP authentication. The 401 originates from iOS Safari's credential cache pre-attaching an Authorization header it learned from a different Basic-Auth device on the same LAN (NAS, printer, router, IPMI), or from an iCloud Keychain entry syncing back. The Bitaxe is healthy and hashing; only the iOS browser experience is broken.

Informational — Monitor and address as needed

Affected Models: Bitaxe Supra, Ultra, Gamma, Gamma Turbo / GT, Hex, UltraHex, Max — only when accessed from iOS / iPadOS Safari, Chrome iOS, Brave iOS, Firefox iOS, Edge iOS, or any in-app WKWebView browser. Loads cleanly on the same network from desktop browsers, Android phones, and Macs.

Symptoms

  • iPhone or iPad Safari shows a popup with `Log in to <miner-ip>` and Username / Password fields — but you never set credentials on AxeOS
  • Hitting Cancel on that popup yields a `401 Unauthorized` page or a blank white page
  • Network panel shows the request to `http://<miner-ip>/` returning HTTP `401`
  • Network panel shows an `Authorization: Basic <base64>` header on the outgoing request you never typed
  • Same URL on the same WiFi loads cleanly from a desktop browser (Mac Safari, Chrome, Firefox, Edge)
  • Same URL loads cleanly from an Android phone on the same WiFi
  • Loads cleanly in Safari Private Browsing but fails in regular Safari
  • Loads cleanly in Chrome iOS / Brave iOS / Firefox iOS but fails in Safari iOS
  • Bitaxe OLED shows live hashrate, valid IP, and active worker — device itself is healthy
  • Pool dashboard (`solo.ckpool.org`, `public-pool.io`, Ocean, Braiins) shows shares from this Bitaxe in the last 10 minutes
  • You recently logged into a different LAN device that does use HTTP Basic Auth (NAS, printer, router admin, IP camera, IPMI controller, or older Antminer)

Step-by-Step Fix

1

Open `http://<miner-ip>/` in a Safari Private Window on the iPhone. Tap the tabs icon, tap `Private`, tap `+`, type or paste the AxeOS URL. Private Browsing does not share Safari's persistent credential cache, so a clean load there confirms the diagnosis: a stale `Authorization` header is being attached from regular Safari's cache. Keep using Private as a workaround until you have time for Tier 2, or jump straight to clearing site data.

2

Force-quit Safari and re-open. Swipe up from the bottom edge (or double-tap the home button on older iPhones) to enter the app switcher, then swipe Safari off the top. Tap Safari again. Re-load the AxeOS URL. This drops Safari's in-memory state — sometimes enough to clear a transient `Authorization` header even before you touch persistent storage.

3

Try the URL from a different iOS browser: Chrome iOS, Brave iOS, Firefox iOS, or Edge iOS. They all use `WKWebView` under the hood (Apple requires it on iOS) but maintain their own credential / cache layer above it. If Chrome works while Safari fails, you have isolated the bug to Safari and confirmed the miner is healthy.

4

Reload AxeOS using both the mDNS form and the raw-IP form. If you have been using `http://bitaxe-xxxx.local/`, switch to the numeric IP from the OLED. If you have been using the IP, try the `.local` form. The credential cache is keyed by URL form, so one of them often works while the other fails.

5

Settings → Safari → Clear History and Website Data → Clear History and Data. This is the correct nuclear option on iOS — there is no per-site equivalent. Confirm the prompt. You will be signed out of websites and lose tab history, but the rogue `Authorization` header for the Bitaxe IP will go with everything else. Force-quit Safari afterward, reopen, retry. This fixes the vast majority of `iOS 401 on AxeOS` reports.

6

Settings → Safari → Advanced → Website Data → Edit → Remove All. Subtler than the History clear above — this targets the cached request / response store specifically and leaves your bookmarks and history alone. Useful when you have already done the full History clear and the 401 still returns. Sometimes the cached `WWW-Authenticate` realm survives a History clear but not a Website Data clear.

7

Disable AutoFill for Safari Passwords temporarily. Settings → Passwords → Password Options → AutoFill Passwords → toggle off. This stops Safari from offering to attach saved credentials to outgoing requests on its own. Re-test AxeOS, then re-enable AutoFill if you do not want to live without it. If the 401 stops while AutoFill is off and returns when you turn it back on, you have found a saved-credential leak — go to step 8.

8

Audit Settings → Passwords for any entries against the miner's IP or `.local` hostname. Search the iOS password manager for the Bitaxe IP, the `.local` hostname, or anything LAN-flavoured. Delete any entries. If you are using iCloud Keychain (Settings → [your name] → iCloud → Passwords and Keychain), the same entries will be on every Apple device signed into your iCloud — purge them everywhere or they will sync back overnight.

9

Close the miner's URL across every iOS / iPadOS device on the same Apple ID. A 401 cached on an iPad and synced via iCloud Keychain will come back on the iPhone after you clear it. Treat the Apple ID as one cache: clear it on every device in the same session before re-testing.

10

Bookmark the working URL form. If you found that `.local` works and the IP does not, or vice versa, bookmark the form that works and use that bookmark exclusively from iOS. This is not a fix to the underlying bug, but it converts the failure from `it broke` to `use this bookmark` — which is sometimes all you need.

11

Tether the iPhone to a Mac and open Web Inspector against the failing tab. On the iPhone: Settings → Safari → Advanced → Web Inspector → On. On the Mac: Safari → Settings → Advanced → Show Develop menu. Plug iPhone into Mac via USB-C / Lightning, trust the computer, then on the Mac: Develop → <Your iPhone> → the AxeOS tab. Open the Network panel, reload the AxeOS URL, watch the request fly. The `Authorization` header (if any) and the actual response status will show whether the 401 is client-side, server-side, or proxy-injected.

12

Capture full request / response pairs in Web Inspector's Network panel. Click the failing request, copy headers and body, save them. Look for `Authorization: Basic <base64>`, `WWW-Authenticate: Basic realm=...`, and the response body. If the body is empty or matches AxeOS's normal HTML start but truncated, the iOS / proxy layer is the cause. If it is a generic Apache / nginx 401 page, you have a proxy or captive portal in the way that is not AxeOS at all.

13

Decode any base64 `Authorization` header. Copy the `Basic <base64>` string from Web Inspector and decode it (`echo "<string>" | base64 -d` on a Mac). The decoded value is `username:password` in cleartext. If it is a username from a NAS / printer / router on your LAN, you have identified the source device whose credentials Safari is leaking. Disable Basic Auth on that device — most modern NAS / IoT admin panels support session-based auth instead — to prevent Safari from ever caching the credential against that LAN host again.

14

Test the iPhone against a Bitaxe in AP mode. Hold BOOT on the Bitaxe at power-on (5-10 seconds depending on firmware) to force AP mode. The Bitaxe broadcasts a `Bitaxe_xxxx` SSID; join it on the iPhone. Browse `http://192.168.4.1/`. AP mode serves the same `www.bin` AxeOS UI but on a brand-new network with no cached state from your home LAN. If the 401 disappears in AP mode, the diagnosis is locked: cache against your home LAN. If it persists in AP mode, the cache is tied to the iPhone itself, not to the network.

15

Reflash AxeOS via the official USB-C web-flasher to rule out (very unlikely) `www.bin` corruption. Use `https://bitaxeorg.github.io/bitaxe-web-flasher/` from Chrome or Edge on a desktop. Flash the latest stable for your variant: `BM1366` = Ultra, `BM1368` = Supra, `BM1370` = Gamma / GT, `BM1397` = Max. Reflashing rarely changes the 401 behaviour because the root cause is iOS-side, but it is free, takes 60 seconds, and rules out a corrupted web partition emitting an unexpected response.

16

There is no Tier-4 hardware repair for this error. If you have worked through Tiers 1-3 and the 401 persists, the issue is somewhere in your iOS / iCloud / network stack that this guide cannot reach from the outside — typically a corporate MDM profile, an aggressive content filter, a captive portal that injects auth, or an iCloud Keychain entry that keeps re-syncing. D-Central cannot repair your iPhone. Book a Bitaxe consultation only if you need a written third-party diagnosis for a corporate IT or MDM escalation — we will bench-test the unit, confirm AxeOS is serving correctly to multiple device classes, and provide a written report.

When to Seek Professional Repair

If the steps above do not resolve the issue, or if you are not comfortable performing these repairs yourself, professional service is recommended. Attempting advanced repairs without proper equipment can cause further damage.

Related Error Codes

Still Having Issues?

Our team of Bitcoin Mining Hackers has been repairing ASIC miners since 2016. We have seen it all and fixed it all. Get a professional diagnosis.