Time | 2023/03/09, 22:32:51 (GMT) |
Transaction ID | NU9XF0JV7NPQ9TNO |
Service | sip |
Location | US (United States) |
Attacker | 167.94.138.33 |
Classification | Options |
Harm Potential | Medium |
- Received ------------------------------------------------------- OPTIONS sip:censysinspect@censys.io SIP/2.0 To: <sip:test.echo@sip5060.net> From: Censys <sip:censysinspect@censys.io> CSeq: 1 OPTIONS Call-ID: a84b4c76e66710 Max-Forwards: 70 Via: SIP/2.0/UDP 127.0.0.1;rport Accept: application/sdp Content-Length: 0 - Sended ------------------------------------------------------- SIP/2.0 400 Bad Request To: <sip:test.echo@sip5060.net>;tag=t5nal585wz From: Censys <sip:censysinspect@censys.io> CSeq: 1 OPTIONS Call-ID: a84b4c76e66710 Max-Forwards: 70 Via: SIP/2.0/UDP 127.0.0.1;received=167.94.138.33;rport=34078 Accept: application/sdp Content-Length: 0
All details are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |