feat: Add pcap import, file browser, logging, local capture, and stable call ordering

This commit is contained in:
Jose Luis Montañes Ojados
2026-01-19 14:28:56 +01:00
parent 3e5742d353
commit efb50ffc8e
19 changed files with 2660 additions and 45 deletions

View File

@@ -0,0 +1,176 @@
[14:25:30.903] [INFO] Logger initialized: logs\2026-01-19_14-25-30.log
[14:25:30.906] [INFO] Starting Telephony Inspector
[14:25:35.313] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:35.317] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:35.320] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:25:35.324] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:25:35.327] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00043a230 0xc00044e000 0xc00031a280 0xc000450000]
[14:25:35.331] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.335] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:25:35.337] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:25:35.338] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.340] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:25:35.342] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:25:35.344] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00043a2a0 0xc00044e0a0 0xc00031a300 0xc000450090]
[14:25:35.346] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.348] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:25:35.350] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:25:35.351] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.353] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:25:35.355] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:25:35.357] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00043a310 0xc00044e140 0xc00031a380 0xc000450120]
[14:25:35.359] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.361] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:25:35.363] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.365] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.366] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:25:35.368] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.370] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00043a380 0xc00044e1e0 0xc00031a400 0xc0004501b0]
[14:25:35.372] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.374] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:25:35.376] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:35.378] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.379] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:25:35.381] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:25:35.383] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00043a3f0 0xc00044e280 0xc00031a480 0xc000450240]
[14:25:35.385] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.387] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:25:35.389] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:25:35.390] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.392] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:25:35.394] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:25:35.396] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00043a460 0xc00044e320 0xc00031a500 0xc0004502d0]
[14:25:35.398] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.399] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:25:35.401] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.403] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.405] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:25:35.406] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.408] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00043a4d0 0xc00044e3c0 0xc00031a580 0xc000450360]
[14:25:35.410] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.412] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:25:35.414] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:35.415] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.417] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:25:35.419] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:25:35.421] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00043a540 0xc00044e460 0xc00031a600 0xc0004503f0]
[14:25:35.439] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.440] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:25:35.442] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.444] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.446] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:25:35.448] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.450] [DEBUG] PcapReader: Processing packet 9, layers: [0xc00043a5b0 0xc00044e500 0xc00031a680 0xc000450480]
[14:25:35.451] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.453] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:25:35.454] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:25:35.457] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.459] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:25:35.461] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.462] [DEBUG] PcapReader: Processing packet 10, layers: [0xc00043a620 0xc00044e5a0 0xc00031a700 0xc000450510]
[14:25:35.465] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.467] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:25:35.468] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:25:35.470] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.472] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:25:35.474] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.476] [DEBUG] PcapReader: Processing packet 11, layers: [0xc00043a690 0xc00044e640 0xc00031a780 0xc0004505a0]
[14:25:35.478] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.480] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:25:35.481] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.483] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.485] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:25:35.487] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.489] [DEBUG] PcapReader: Processing packet 12, layers: [0xc00043a700 0xc00044e6e0 0xc00031a800 0xc000450630]
[14:25:35.491] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.492] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:25:35.494] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:35.496] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.498] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:25:35.500] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:25:35.502] [DEBUG] PcapReader: Processing packet 13, layers: [0xc00043a770 0xc00044e780 0xc00031a880 0xc0004506c0]
[14:25:35.504] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.505] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:25:35.507] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:25:35.509] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.511] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:25:35.513] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.515] [DEBUG] PcapReader: Processing packet 14, layers: [0xc00043a7e0 0xc00044e820 0xc00031a900 0xc000450750]
[14:25:35.517] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.519] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:25:35.521] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.522] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.524] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:25:35.526] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.528] [DEBUG] PcapReader: Processing packet 15, layers: [0xc00043a850 0xc00044e8c0 0xc00031a980 0xc0004507e0]
[14:25:35.530] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.532] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:25:35.534] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:35.535] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.537] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:25:35.539] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.541] [DEBUG] PcapReader: Processing packet 16, layers: [0xc00043a8c0 0xc00044e960 0xc00031aa00 0xc000450870]
[14:25:35.543] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.545] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:25:35.546] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.548] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.550] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:25:35.552] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.554] [DEBUG] PcapReader: Processing packet 17, layers: [0xc00043a930 0xc00044ea00 0xc00031aa80 0xc000450900]
[14:25:35.555] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.557] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:25:35.559] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:35.561] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.563] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:25:35.565] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:25:35.567] [DEBUG] PcapReader: Processing packet 18, layers: [0xc00043a9a0 0xc00044eaa0 0xc00031ab00 0xc000450990]
[14:25:35.568] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.570] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:25:35.572] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:25:35.574] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.576] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:25:35.578] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:25:35.579] [DEBUG] PcapReader: Processing packet 19, layers: [0xc00043aa10 0xc00044eb40 0xc00031ab80 0xc000450a20]
[14:25:35.581] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.583] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:25:35.585] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.587] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.589] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:25:35.591] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.592] [DEBUG] PcapReader: Processing packet 20, layers: [0xc00043aa80 0xc00044ebe0 0xc00031ac00 0xc000450ab0]
[14:25:35.594] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.596] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:25:35.598] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:35.600] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.602] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:25:35.604] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:25:35.605] [DEBUG] PcapReader: Processing packet 21, layers: [0xc00043aaf0 0xc00044ec80 0xc00031ac80 0xc000450b40]
[14:25:35.607] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.609] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:25:35.611] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:35.613] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.615] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:25:35.617] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:25:35.618] [DEBUG] PcapReader: Processing packet 22, layers: [0xc00043ab60 0xc00044ed20 0xc00031ad00 0xc000450bd0]
[14:25:35.620] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.622] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:25:35.625] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.627] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.629] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:25:35.630] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.632] [DEBUG] PcapReader: Processing packet 23, layers: [0xc00043abd0 0xc00044edc0 0xc00031ad80 0xc000450c60]
[14:25:35.634] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.636] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:25:35.638] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:35.640] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.642] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:25:35.644] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:25:35.645] [DEBUG] PcapReader: Processing packet 24, layers: [0xc00043ac40 0xc00044ee60 0xc00031ae00 0xc000450cf0]
[14:25:35.647] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.649] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:25:35.651] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.652] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.654] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:25:35.656] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.658] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:28:06.938] [INFO] Telephony Inspector exited normally