176 lines
19 KiB
Plaintext
176 lines
19 KiB
Plaintext
|
|
[14:28:08.952] [INFO] Logger initialized: logs\2026-01-19_14-28-08.log
|
||
|
|
[14:28:08.956] [INFO] Starting Telephony Inspector
|
||
|
|
[14:28:12.252] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
|
||
|
|
[14:28:12.256] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
|
||
|
|
[14:28:12.260] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||
|
|
[14:28:12.264] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||
|
|
[14:28:12.267] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0000e3b20 0xc0000b8640 0xc0000e0280 0xc00037e000]
|
||
|
|
[14:28:12.272] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.275] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
|
||
|
|
[14:28:12.277] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
|
||
|
|
[14:28:12.280] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||
|
|
[14:28:12.281] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||
|
|
[14:28:12.283] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.285] [DEBUG] PcapReader: Processing packet 2, layers: [0xc0000e3b90 0xc0000b86e0 0xc0000e0300 0xc00037e090]
|
||
|
|
[14:28:12.286] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.289] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||
|
|
[14:28:12.290] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
|
||
|
|
[14:28:12.292] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.294] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||
|
|
[14:28:12.296] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.298] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0000e3c00 0xc0000b8780 0xc0000e0380 0xc00037e120]
|
||
|
|
[14:28:12.300] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.302] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||
|
|
[14:28:12.304] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.306] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.307] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||
|
|
[14:28:12.309] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.311] [DEBUG] PcapReader: Processing packet 4, layers: [0xc0000e3c70 0xc0000b8820 0xc0000e0400 0xc00037e1b0]
|
||
|
|
[14:28:12.313] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.315] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||
|
|
[14:28:12.317] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||
|
|
[14:28:12.319] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||
|
|
[14:28:12.320] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||
|
|
[14:28:12.322] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.324] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0000e3ce0 0xc0000b88c0 0xc0000e0480 0xc00037e240]
|
||
|
|
[14:28:12.326] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.328] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
|
||
|
|
[14:28:12.330] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
|
||
|
|
[14:28:12.332] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||
|
|
[14:28:12.334] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||
|
|
[14:28:12.335] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.337] [DEBUG] PcapReader: Processing packet 6, layers: [0xc0000e3d50 0xc0000b8960 0xc0000e0500 0xc00037e2d0]
|
||
|
|
[14:28:12.339] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.341] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||
|
|
[14:28:12.342] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.345] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.346] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||
|
|
[14:28:12.348] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.350] [DEBUG] PcapReader: Processing packet 7, layers: [0xc0000e3dc0 0xc0000b8a00 0xc0000e0580 0xc00037e360]
|
||
|
|
[14:28:12.352] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.354] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||
|
|
[14:28:12.356] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||
|
|
[14:28:12.358] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||
|
|
[14:28:12.360] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||
|
|
[14:28:12.361] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.363] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0000e3e30 0xc0000b8aa0 0xc0000e0600 0xc00037e3f0]
|
||
|
|
[14:28:12.365] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.367] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||
|
|
[14:28:12.369] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.371] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.373] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||
|
|
[14:28:12.374] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
|
||
|
|
[14:28:12.376] [DEBUG] PcapReader: Processing packet 9, layers: [0xc0000e3ea0 0xc0000b8b40 0xc0000e0680 0xc00037e480]
|
||
|
|
[14:28:12.378] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.380] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
|
||
|
|
[14:28:12.382] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
|
||
|
|
[14:28:12.384] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||
|
|
[14:28:12.386] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
|
||
|
|
[14:28:12.388] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.390] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0000e3f10 0xc0000b8be0 0xc0000e0700 0xc00037e510]
|
||
|
|
[14:28:12.391] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.394] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
|
||
|
|
[14:28:12.395] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
|
||
|
|
[14:28:12.397] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.399] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
|
||
|
|
[14:28:12.401] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.403] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000498000 0xc0000b8c80 0xc0000e0780 0xc00037e5a0]
|
||
|
|
[14:28:12.405] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.407] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
|
||
|
|
[14:28:12.408] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.410] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.413] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
|
||
|
|
[14:28:12.414] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.416] [DEBUG] PcapReader: Processing packet 12, layers: [0xc000498070 0xc0000b8d20 0xc0000e0800 0xc00037e630]
|
||
|
|
[14:28:12.418] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.419] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
|
||
|
|
[14:28:12.421] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||
|
|
[14:28:12.423] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||
|
|
[14:28:12.425] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
|
||
|
|
[14:28:12.427] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.429] [DEBUG] PcapReader: Processing packet 13, layers: [0xc0004980e0 0xc0000b8dc0 0xc0000e0880 0xc00037e6c0]
|
||
|
|
[14:28:12.431] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.433] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
|
||
|
|
[14:28:12.434] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
|
||
|
|
[14:28:12.436] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||
|
|
[14:28:12.438] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
|
||
|
|
[14:28:12.440] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.442] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000498150 0xc0000b8e60 0xc0000e0900 0xc00037e750]
|
||
|
|
[14:28:12.444] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.446] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
|
||
|
|
[14:28:12.448] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.449] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.451] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
|
||
|
|
[14:28:12.453] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.455] [DEBUG] PcapReader: Processing packet 15, layers: [0xc0004981c0 0xc0000b8f00 0xc0000e0980 0xc00037e7e0]
|
||
|
|
[14:28:12.457] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.459] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
|
||
|
|
[14:28:12.461] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||
|
|
[14:28:12.462] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||
|
|
[14:28:12.464] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
|
||
|
|
[14:28:12.466] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.468] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000498230 0xc0000b8fa0 0xc0000e0a00 0xc00037e870]
|
||
|
|
[14:28:12.470] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.472] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
|
||
|
|
[14:28:12.474] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.476] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.482] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
|
||
|
|
[14:28:12.484] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
|
||
|
|
[14:28:12.485] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0004982a0 0xc0000b9040 0xc0000e0a80 0xc00037e900]
|
||
|
|
[14:28:12.487] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.489] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
|
||
|
|
[14:28:12.492] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||
|
|
[14:28:12.493] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||
|
|
[14:28:12.495] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
|
||
|
|
[14:28:12.497] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.499] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000498310 0xc0000b90e0 0xc0000e0b00 0xc00037e990]
|
||
|
|
[14:28:12.501] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.504] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
|
||
|
|
[14:28:12.505] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
|
||
|
|
[14:28:12.507] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.509] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
|
||
|
|
[14:28:12.511] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.513] [DEBUG] PcapReader: Processing packet 19, layers: [0xc000498380 0xc0000b9180 0xc0000e0b80 0xc00037ea20]
|
||
|
|
[14:28:12.515] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.517] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
|
||
|
|
[14:28:12.518] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.521] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.523] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
|
||
|
|
[14:28:12.524] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.526] [DEBUG] PcapReader: Processing packet 20, layers: [0xc0004983f0 0xc0000b9220 0xc0000e0c00 0xc00037eab0]
|
||
|
|
[14:28:12.528] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.530] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
|
||
|
|
[14:28:12.532] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||
|
|
[14:28:12.534] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||
|
|
[14:28:12.535] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
|
||
|
|
[14:28:12.537] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.539] [DEBUG] PcapReader: Processing packet 21, layers: [0xc000498460 0xc0000b92c0 0xc0000e0c80 0xc00037eb40]
|
||
|
|
[14:28:12.541] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.543] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
|
||
|
|
[14:28:12.545] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||
|
|
[14:28:12.547] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||
|
|
[14:28:12.548] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
|
||
|
|
[14:28:12.550] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.552] [DEBUG] PcapReader: Processing packet 22, layers: [0xc0004984d0 0xc0000b9360 0xc0000e0d00 0xc00037ebd0]
|
||
|
|
[14:28:12.554] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.555] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
|
||
|
|
[14:28:12.558] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.559] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.561] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
|
||
|
|
[14:28:12.563] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.565] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000498540 0xc0000b9400 0xc0000e0d80 0xc00037ec60]
|
||
|
|
[14:28:12.566] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
|
||
|
|
[14:28:12.568] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
|
||
|
|
[14:28:12.570] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||
|
|
[14:28:12.572] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||
|
|
[14:28:12.574] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
|
||
|
|
[14:28:12.576] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.578] [DEBUG] PcapReader: Processing packet 24, layers: [0xc0004985b0 0xc0000b94a0 0xc0000e0e00 0xc00037ecf0]
|
||
|
|
[14:28:12.579] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
|
||
|
|
[14:28:12.581] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
|
||
|
|
[14:28:12.583] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||
|
|
[14:28:12.585] [DEBUG] isSIPPayload: Detected SIP response
|
||
|
|
[14:28:12.587] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
|
||
|
|
[14:28:12.588] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
|
||
|
|
[14:28:12.591] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
|