Time | 2024/07/02, 00:10:59 (GMT) |
Transaction ID | V4F12A5RNA7QRW01 |
Service | sip |
Location | US (United States) |
Attacker | 206.168.34.115 |
Classification | Options |
Harm Potential | Medium |
- Received ------------------------------------------------------- OPTIONS sip:censysinspect@censys.io SIP/2.0 To: <sip:test.echo@sip5060.net> From: Censys <sip:censysinspect@censys.io> CSeq: 1 OPTIONS Call-ID: a84b4c76e66710 Max-Forwards: 70 Via: SIP/2.0/UDP 127.0.0.1;rport Accept: application/sdp Content-Length: 0 - Sended ------------------------------------------------------- SIP/2.0 400 Bad Request To: <sip:test.echo@sip5060.net>;tag=1kro3ck4mn From: Censys <sip:censysinspect@censys.io> CSeq: 1 OPTIONS Call-ID: a84b4c76e66710 Max-Forwards: 70 Via: SIP/2.0/UDP 127.0.0.1;received=206.168.34.115;rport=54314 Accept: application/sdp Content-Length: 0
All details are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |