Just to point out in case it wasn’t clear… the traffic to that URL isn’t coming from the app. They’re coming from the cameras themselves.
I only received logs of it for around 30 minutes, from 2:34:13PM to 3:02:50PM on March 17, 2020 (GMT+8).
Here is a sample JSON entry from the firewall log. I have replaced the the Cam’s address with <local_Cam_IP> and my public IP with <WAN_IP>. I’ve also obscured the GPS coordinates for purposes of anonymity.
{"reason":"BLOCK_CATEGORY","appName":"web_filter","requestLine":"GET http://wyze-device-alarm-file-ai.s3.us-west-2.amazonaws.com/","sessionEvent":{"entitled":true,"partitionTablePostfix":"_2020_03_17","hostname":"**<local_Cam_IP>**","CServerPort":443,"protocol":6,"protocolName":"TCP","serverLatitude":20.8491,"localAddr":"/<local_Cam_IP>","class":"class com.untangle.uvm.app.SessionEvent","SServerAddr":"/52.218.228.17","serverIntf":1,"remoteAddr":"/52.218.228.17","CClientAddr":"/<local_Cam_IP>","serverCountry":"US","sessionId":103777098312761,"SClientAddr":"/<WAN_IP>","clientCountry":"XL","CClientPort":55249,"policyRuleId":0,"timeStamp":"2020-03-17 15:02:50.326","serverLongitude":-80.7143,"clientIntf":2,"policyId":1,"SClientPort":55249,"bypassed":false,"SServerPort":443,"CServerAddr":"/52.218.228.17","tagsString":""},"partitionTablePostfix":"_2020_03_17","timeStamp":"2020-03-17 15:02:50.528","flagged":true,"blocked":true,"tag":"Web_Filter [8]:","category":"Phishing and Other Frauds","ruleId":57,"class":"class com.untangle.app.web_filter.WebFilterEvent","categoryId":57}
Each <local_Cam_IP> generates its own JSON entry but they’re practically identical… all points to that one URL which was being blocked by the Web Filter.