feat: Add pcap import, file browser, logging, local capture, and stable call ordering

This commit is contained in:
Jose Luis Montañes Ojados
2026-01-19 14:28:56 +01:00
parent 3e5742d353
commit efb50ffc8e
19 changed files with 2660 additions and 45 deletions

View File

@@ -0,0 +1,237 @@
[14:23:22.124] [INFO] Logger initialized: logs\2026-01-19_14-23-22.log
[14:23:22.128] [INFO] Starting Telephony Inspector
[14:23:26.188] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\test.pcapng
[14:23:26.193] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\test.pcapng
[14:23:26.197] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:23:26.200] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:23:26.204] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00048c0e0 0xc00049c000 0xc000332100 0xc00049e000]
[14:23:26.208] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.212] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1154
[14:23:26.214] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:145632@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094"
[14:23:26.215] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:23:26.218] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:23:26.220] [INFO] PcapReader: Found SIP packet 1: INVITE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.221] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00048c150 0xc00049c0a0 0xc000332180 0xc00049e090]
[14:23:26.223] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.225] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:23:26.227] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001"
[14:23:26.229] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.231] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:23:26.233] [INFO] PcapReader: Found SIP packet 2: 100 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.234] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00048c1c0 0xc00049c140 0xc000332200 0xc00049e120]
[14:23:26.236] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.238] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:23:26.240] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.242] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.244] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:23:26.246] [INFO] PcapReader: Found SIP packet 3: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.248] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00048c230 0xc00049c1e0 0xc000332280 0xc00049e1b0]
[14:23:26.249] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.251] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:23:26.253] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj5a53b67ee71748bf944b029063d2d8b4\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
[14:23:26.255] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:23:26.257] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:23:26.259] [INFO] PcapReader: Found SIP packet 4: ACK b8060bf9ee0d43cbb60d714e22046659
[14:23:26.261] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00048c2a0 0xc00049c280 0xc000332300 0xc00049e240]
[14:23:26.263] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.264] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 871
[14:23:26.267] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3"
[14:23:26.269] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:23:26.271] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:23:26.273] [INFO] PcapReader: Found SIP packet 5: UPDATE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.275] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00048c310 0xc00049c320 0xc000332380 0xc00049e2d0]
[14:23:26.276] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.278] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:23:26.280] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.282] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.284] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:23:26.286] [INFO] PcapReader: Found SIP packet 6: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.288] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00048c380 0xc00049c3c0 0xc000332400 0xc00049e360]
[14:23:26.289] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.291] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:23:26.293] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
[14:23:26.295] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:23:26.297] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:23:26.299] [INFO] PcapReader: Found SIP packet 7: BYE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.301] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00048c3f0 0xc00049c460 0xc000332480 0xc00049e3f0]
[14:23:26.303] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.305] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:23:26.306] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.308] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.310] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:23:26.311] [INFO] PcapReader: Found SIP packet 8: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.314] [INFO] PcapReader: Finished reading. Total packets: 8, SIP packets: 8
[14:25:08.950] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:08.953] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:08.955] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:25:08.957] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:25:08.959] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0005320e0 0xc0001121e0 0xc000154080 0xc000232090]
[14:25:08.961] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:08.963] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:25:08.965] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:25:08.967] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:08.969] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:25:08.971] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:25:08.973] [DEBUG] PcapReader: Processing packet 2, layers: [0xc000532150 0xc000112460 0xc000154100 0xc000232120]
[14:25:08.975] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:08.976] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:25:08.978] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:25:08.980] [DEBUG] isSIPPayload: Detected SIP response
[14:25:08.981] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:25:08.984] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:25:08.986] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0005321c0 0xc0001125a0 0xc000154180 0xc0002321b0]
[14:25:08.988] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:08.990] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:25:08.991] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:08.993] [DEBUG] isSIPPayload: Detected SIP response
[14:25:08.995] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:25:08.997] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:25:08.998] [DEBUG] PcapReader: Processing packet 4, layers: [0xc000532230 0xc0001126e0 0xc000154200 0xc000232240]
[14:25:09.001] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.006] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:25:09.008] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:09.010] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.012] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:25:09.014] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:25:09.016] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0005322a0 0xc000112780 0xc000154280 0xc0002322d0]
[14:25:09.018] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.019] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:25:09.021] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:25:09.023] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.025] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:25:09.027] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:25:09.029] [DEBUG] PcapReader: Processing packet 6, layers: [0xc000532310 0xc000112820 0xc000154300 0xc000232360]
[14:25:09.031] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.032] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:25:09.034] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:09.035] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.038] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:25:09.040] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:25:09.041] [DEBUG] PcapReader: Processing packet 7, layers: [0xc000532380 0xc0001128c0 0xc000154380 0xc0002323f0]
[14:25:09.043] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.045] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:25:09.047] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:09.048] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.051] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:25:09.052] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:25:09.054] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0005323f0 0xc000112960 0xc000154400 0xc000232480]
[14:25:09.056] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.058] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:25:09.059] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:09.061] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.064] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:25:09.065] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:25:09.067] [DEBUG] PcapReader: Processing packet 9, layers: [0xc000532460 0xc000112a00 0xc000154480 0xc000232510]
[14:25:09.069] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.071] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:25:09.073] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:25:09.074] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:09.076] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:25:09.078] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.080] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0005324d0 0xc000112aa0 0xc000154580 0xc0002325a0]
[14:25:09.081] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.083] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:25:09.085] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:25:09.087] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.089] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:25:09.090] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.092] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000532540 0xc000112b40 0xc000154600 0xc000232630]
[14:25:09.094] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.096] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:25:09.098] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.100] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.101] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:25:09.103] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.105] [DEBUG] PcapReader: Processing packet 12, layers: [0xc0005325b0 0xc000112be0 0xc000154680 0xc0002326c0]
[14:25:09.107] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.108] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:25:09.110] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:09.112] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.114] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:25:09.116] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:25:09.118] [DEBUG] PcapReader: Processing packet 13, layers: [0xc000532620 0xc000112c80 0xc000154700 0xc000232750]
[14:25:09.120] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.121] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:25:09.123] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:25:09.125] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.127] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:25:09.129] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.131] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000532690 0xc000112d20 0xc000154780 0xc0002327e0]
[14:25:09.132] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.134] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:25:09.136] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.138] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.139] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:25:09.141] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.143] [DEBUG] PcapReader: Processing packet 15, layers: [0xc000532700 0xc000112dc0 0xc000154800 0xc000232870]
[14:25:09.145] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.147] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:25:09.148] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:09.150] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.152] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:25:09.154] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.156] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000532770 0xc000112e60 0xc000154880 0xc000232900]
[14:25:09.157] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.159] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:25:09.162] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.163] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.165] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:25:09.167] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.169] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0005327e0 0xc000112f00 0xc000154900 0xc000232990]
[14:25:09.171] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.173] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:25:09.175] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:09.176] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:09.178] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:25:09.180] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:25:09.181] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000532850 0xc000112fa0 0xc000154980 0xc000232a20]
[14:25:09.184] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.186] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:25:09.187] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:25:09.189] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.191] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:25:09.193] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:25:09.195] [DEBUG] PcapReader: Processing packet 19, layers: [0xc0005328c0 0xc000113040 0xc000154a00 0xc000232ab0]
[14:25:09.197] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.198] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:25:09.201] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.202] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.204] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:25:09.206] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.208] [DEBUG] PcapReader: Processing packet 20, layers: [0xc000532930 0xc0001130e0 0xc000154a80 0xc000232b40]
[14:25:09.209] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.212] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:25:09.213] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:09.215] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.217] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:25:09.219] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:25:09.221] [DEBUG] PcapReader: Processing packet 21, layers: [0xc0005329a0 0xc000113180 0xc000154b00 0xc000232bd0]
[14:25:09.223] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.224] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:25:09.226] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:09.228] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.230] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:25:09.231] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:25:09.233] [DEBUG] PcapReader: Processing packet 22, layers: [0xc000532a10 0xc000113220 0xc000154b80 0xc000232c60]
[14:25:09.235] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.237] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:25:09.239] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.241] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.242] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:25:09.245] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.246] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000532a80 0xc0001132c0 0xc000154c00 0xc000232cf0]
[14:25:09.248] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.250] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:25:09.252] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:09.253] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.255] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:25:09.257] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:25:09.259] [DEBUG] PcapReader: Processing packet 24, layers: [0xc000532af0 0xc000113360 0xc000154c80 0xc000232d80]
[14:25:09.261] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.263] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:25:09.264] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.266] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.268] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:25:09.270] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.271] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:25:29.806] [INFO] Telephony Inspector exited normally