UDP 162 (SNMP Trap)

I shouldn’t even open a topic since I don’t use python, C, or anything standard. But would like to take the UDP stream as is (bin/hex) and discern my own to pull the data.
And maybe I should read the RFCs for it but I’ll get stuck anyways, so…, any of you developers can lead me on how to chop’n’dice the short ( about 170 bytes ) UDP stream ?
Is the version 2c so it should be simple. Thanks :slight_smile:

I’ll leave you with an emoji ( for emotional manipulation ) :index_pointing_at_the_viewer: :pray:


Edit:
Found that looking ( from right to left ) for 0x020304 ( or 0x02020304, not sure ) the next byte is the length of the ( left to right ) text message.
But there are other things that would be nice to know too. Like the importance level of the message.
I know I code kind of reversing what I see but, am not a programmer, though I enjoy coding.

…I also made a ( what I call ) “eMail trap” to compare with SNMP trap and for what I see when a Scrub of pool ‘boot-pool’ event the SNMP comes out without the description. Is that the way is supposed to be ?