Time | 2023/09/10, 05:31:30 (GMT) |
Transaction ID | FLR7ZYJG60Z47Z8O |
Service | sip |
Location | HK (Hong Kong) |
Attacker | 185.233.19.163 |
Classification | Options |
Harm Potential | Medium |
- Received ------------------------------------------------------- OPTIONS sip:nm SIP/2.0 Via: SIP/2.0/TCP nm;branch=foo;rport From: <sip:nm@nm>;tag=root To: <sip:nm2@nm2> Call-ID: 50000 CSeq: 42 OPTIONS Max-Forwards: 70 Content-Length: 0 Contact: <sip:nm@nm> Accept: application/sdp - Sended ------------------------------------------------------- SIP/2.0 400 Bad Request Via: SIP/2.0/TCP nm;branch=foo;received=185.233.19.163;rport=55560 From: <sip:nm@nm>;tag=root To: <sip:nm2@nm2>;tag=w0678ss3g9 Call-ID: 50000 CSeq: 42 OPTIONS Max-Forwards: 70 Content-Length: 0 Contact: <sip:nm@nm> Accept: application/sdp
All details are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |