Whatsminer M30S – MinerTool Cannot Connect
Informational — Monitor and address as needed
Symptoms
- WhatsminerTool lists the M30S in the device table but throws `Connection timed out` or `No response` on double-click
- IPFOUND returns zero devices even though the miner's front LED is steady green and all four fans are running
- Miner replies to `ping <ip>` and the BTminer web UI loads, but WhatsminerTool still cannot attach to the API
- `telnet <miner-ip> 4028` either hangs indefinitely or returns `Connection refused`
- Pool dashboard shows the miner online and hashing at nameplate - the fault is tool-only, not mining-path
- Multiple M30S sit on the same switch; some connect in WhatsminerTool, others do not
- WhatsminerTool version banner reads V9.x but the miner is on firmware older than `20201118` (or inverse: V8.x tool against firmware newer than `20231127`)
- Windows Defender, corporate firewall, or an active VPN client is running on the laptop hosting WhatsminerTool
- Control-board status LED is steady green - physical health OK - but TCP 4028 is silent
- Post-factory-reset: the miner rejoins the LAN but WhatsminerTool still cannot connect until a full PSU-side power-cycle
- Miner is reachable from a terminal on the mining LAN but not from an office LAN behind a router / firewall
- `api.log` (pulled via web UI or SD card) shows `client reject: session in use` or `token mismatch`
- Laptop is on Wi-Fi AND Ethernet at the same time (Intel AX200/AX210 cards drop UDP broadcast replies in this state)
Step-by-Step Fix
Tier 1 - Verify the miner is actually hashing before touching anything else. Log into your pool dashboard (F2Pool, Braiins, ViaBTC, Ocean, or solo.ckpool.org for solo lottery miners) and confirm the M30S's worker name is reporting ~88-112 TH/s depending on variant and that shares have been submitted in the last 10 minutes. If the miner is hashing, you have a tool-only problem and this page's Tier 1-2 will almost certainly resolve it. If the miner is silent, skip to Step 3 - you have a deeper issue wearing a network costume.
Tier 1 - Close every other instance of WhatsminerTool, BTMiner, pymwe scripts, awesome-miner, Foreman, Minerstat agents, Hive OS, and any custom Python script using the TCP 4028 API. The M30S API is single-session. Wait a full 120 seconds for any stale socket to time out server-side. Reopen WhatsminerTool on one laptop only and retry the connection. This single step resolves roughly 30% of tickets - teams running multiple tools simultaneously lock themselves out without realizing it.
Tier 1 - Put the laptop on the exact same `/24` subnet as the miner and on the same VLAN if your network uses them. Disable Wi-Fi entirely on the laptop (IPFOUND uses UDP broadcasts on port `8888` which do not cross routers and which Intel AX200/AX210 Wi-Fi cards drop from the wired NIC in dual-active mode). Run IPFOUND again. If the miner appears, try the double-click connection. If IPFOUND still returns zero, continue to Step 4.
Tier 1 - Temporarily disable Windows Defender Firewall, any corporate AV, and disconnect any VPN client. Add an outbound and inbound rule for UDP port `8888` (IPFOUND) and TCP port `4028` (Whatsminer API) permanently once you confirm this was the blocker. VPN clients in particular intercept broadcast traffic even when you think they're idle. Retry WhatsminerTool. If connection succeeds, re-enable security with the proper port exceptions in place.
Tier 1 - Cold power-cycle the miner. Kill power at the PSU, not a soft reboot from the web UI. Wait a full 60 seconds for capacitors to drain and the API daemon to fully release its sockets. Re-power and wait 90 seconds for the control board to finish boot and DHCP. Run IPFOUND. A cold boot clears any stuck-session state on the miner side that a warm reboot preserves.
Tier 2 - Swap the Ethernet patch cable for a known-good Cat6 or better. The cable that ships in the M30S box is frequently borderline - some ship with loose-tolerance RJ45 jacks that work on the bench but fail under the mechanical stress of a stiff cable or a container-deployment cable tray. Try a different switch port too. If the switch's link LED was flickering, you had a layer-1 problem, not an API one.
Tier 2 - Confirm with a multimeter that PSU output to the control-board rail is within spec under load. The M30S control board brown-outs below ~11.5 V on the 12 V rail, which causes the API daemon to crash even while the main mining loop holds up. If you read <11.8 V under load at the CB header, your PSU or line voltage is the problem - jump to Whatsminer M30S Power Supply Failure (post 82456) for the PSU diagnostic path.
Tier 2 - Open a terminal and run `ping <miner-ip>` and `telnet <miner-ip> 4028` (or `nc -zv <miner-ip> 4028` on macOS/Linux). If ping works but 4028 is refused, the API daemon has crashed without taking down the HTTP stack. Web UI reboot is the fix - log in, Advanced → Reboot. If ping itself fails, you have an ARP/DHCP problem; skip to Step 11. If 4028 accepts the connection but immediately closes, you have a token/firmware skew - go to Step 10.
Tier 2 - Try a USB-to-Ethernet adapter on the laptop instead of the built-in NIC. Built-in Realtek NICs on some consumer laptops silently rate-limit broadcast traffic. A cheap USB-Gb adapter (ASIX AX88179 or Realtek RTL8153 chipset) costs under $25 CAD and eliminates the entire class of laptop-NIC-broadcast bugs. This is a $20 test that saves hours.
Tier 3 - Match the WhatsminerTool version to the miner firmware era. Read firmware build via web UI → Miner Info. Known-working pairs: WhatsminerTool V9.0.1 with firmware `20201118`-`20231127`; V9.1+ tools for firmware `20241xxx`-`20251xxx`; V8.x tools only for firmware older than `20201118`. Download the matching tool from support.whatsminer.com or the Files section on Whatsminer's Medium. Do not mix major versions - it completes TCP handshake then aborts on first write with a token error.
Tier 3 - If the miner isn't getting a DHCP lease, reserve an IP on your router keyed to the miner's MAC (printed on the control-board sticker, also on the outer chassis label on M30S and M30S+). Power-cycle after the reservation is saved. This rules out transient DHCP pool exhaustion - a surprisingly common cause in home mining setups where a lot of IoT devices share the same residential router.
Tier 3 - Perform the recessed-button factory reset. Locate the small recessed button near the SD-card slot on the control board (M30S revisions vary - some require opening the upper cover to reach it). With the miner powered ON, press and hold for approximately 5 seconds, then release. The control board re-generates its API token, drops any locked session, and reboots. This clears token-mismatch states without needing a full firmware re-flash. Expect a ~60-second reboot then retry IPFOUND.
Tier 3 - SD-card firmware recovery. Download the matching firmware image from support.whatsminer.com (MD5-verify it - MicroBT's CDN has served corrupted images in the past). Write to a micro-SD with Etcher. With the miner powered off, insert the SD card, power on, and wait for the front LED to cycle green-red-green (~3-5 minutes depending on firmware size). Remove SD card, reboot. This overwrites the control-board firmware from scratch including the API daemon, clearing any corruption that the reset button can't fix.
Tier 3 - If you run custom firmware (Vnish, Asicdip, Hiveon) and stock WhatsminerTool can't connect, this is by design. Custom firmware trips MicroBT's `100001`-`100003` anti-tamper integrity codes. Either use the custom firmware's own management tool (Vnish's web UI, Asicdip's dashboard), or flash back to stock via SD card. Note: DCENT_OS is NOT an option here - that firmware runs only on Bitmain Antminer hardware, not Whatsminer M30S control boards.
Tier 3 - Pull logs before escalating. If the web UI is still accessible, download `api.log`, `miner.log`, and `system.log` via the Support → Download Log button. Open `api.log` in a text editor and search for `token`, `session`, `reject`, or `refused`. If you see `client reject: token mismatch` after a matched-version firmware/tool pair, the control-board's secure element may be corrupt - this is a Tier 4 case.
Tier 3 - If you've got serial-console hardware (USB-UART adapter, 3.3V logic level), open the control board and attach to the TX/RX/GND pads. Baud `115200` on most M30S revisions. Boot the miner and watch the console for API daemon errors. Look for `btminer_api: bind failed` or `btminer_api: auth_init failed`. These confirm software-side failure vs hardware. This is optional; most shops go to Tier 4 instead.
Tier 4 - If Step 13's SD-card firmware recovery and Step 12's hardware reset both fail, and Step 7's voltage check was clean, the control board is either physically damaged or its secure element is corrupt. Stop here. Ship to D-Central with a note referencing this troubleshooting path: 'Completed Tier 1-3 of NET_ERR MinerTool-Cannot-Connect playbook; CB does not respond to API after FW recovery and hardware reset.' That context saves our bench an hour of rework.
Tier 4 - For fleet customers with >10 M30S on one site and recurring API disconnects, request a D-Central remote diagnostic session. We can SSH into a jump host on your mining LAN, pull logs from every miner in one pass, and identify whether you have an environmental issue (ambient temp, PDU voltage, RH) vs unit-by-unit hardware failure. Book via the repair service page or your D-Central account manager.
Tier 4 - Control-board replacement. D-Central stocks OEM-compatible M30S control boards. Replacement includes fresh firmware flash, API validation, pool-connect sanity check, and 30-day warranty on the board itself. Typical bench time is 45 minutes to 2 hours depending on whether firmware recovery is needed pre-swap. Quote via the repair service page: estimated `$200-$350 CAD` parts + labour (VERIFY: current M30S CB pricing - D-Central internal).
When to Seek Professional Repair
If the steps above do not resolve the issue, or if you are not comfortable performing these repairs yourself, professional service is recommended. Attempting advanced repairs without proper equipment can cause further damage.
Related Error Codes
Still Having Issues?
Our team of Bitcoin Mining Hackers has been repairing ASIC miners since 2016. We have seen it all and fixed it all. Get a professional diagnosis.
