Compare commits

...

7 Commits

Author SHA1 Message Date
Jose Luis Montañes Ojados
854cf926ed feat: Add call duration to call detail view 2026-01-19 15:02:27 +01:00
Jose Luis Montañes Ojados
bdd6cbf72a fix: Allow direct 'p' shortcut for pcap import in Capture View 2026-01-19 14:54:49 +01:00
Jose Luis Montañes Ojados
6c80a2410e chore: add .gitignore to ignore logs directory. 2026-01-19 14:53:51 +01:00
Jose Luis Montañes Ojados
a350c3f178 feat: Add .gitignore and an initial network map configuration in JSON format. 2026-01-19 14:53:28 +01:00
Jose Luis Montañes Ojados
5f00506758 feat: Update node label format to Name (Type) without outer parentheses 2026-01-19 14:52:38 +01:00
Jose Luis Montañes Ojados
2a8f0c633a feat: Add PCAP import shortcut to capture view help 2026-01-19 14:49:50 +01:00
Jose Luis Montañes Ojados
7cb29c45e3 feat: Add colored node labels by type and clean up display format 2026-01-19 14:48:03 +01:00
11 changed files with 206 additions and 823 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
logs/

Binary file not shown.

View File

@@ -1,5 +1,7 @@
package config
import "fmt"
// NodeType represents the type of network node
type NodeType string
@@ -56,7 +58,7 @@ func (nm *NetworkMap) FindByIP(ip string) *NetworkNode {
// LabelForIP returns a human-readable label for an IP, or the IP itself if unknown
func (nm *NetworkMap) LabelForIP(ip string) string {
if node := nm.FindByIP(ip); node != nil {
return node.Name + " (" + string(node.Type) + ")"
return fmt.Sprintf("%s (%s)", node.Name, node.Type)
}
return ip
}

View File

@@ -52,11 +52,18 @@ func (s *CallFlowStore) AddPacket(p *Packet) *CallFlow {
}
flow, exists := s.flows[p.CallID]
// Determine timestamp to use
ts := p.Timestamp
if ts.IsZero() {
ts = time.Now()
}
if !exists {
flow = &CallFlow{
CallID: p.CallID,
Packets: make([]*Packet, 0),
StartTime: time.Now(),
StartTime: ts,
From: p.From,
To: p.To,
State: CallStateInitial,
@@ -65,7 +72,10 @@ func (s *CallFlowStore) AddPacket(p *Packet) *CallFlow {
}
flow.Packets = append(flow.Packets, p)
flow.EndTime = time.Now()
// Always update EndTime to the latest packet's timestamp
if ts.After(flow.EndTime) {
flow.EndTime = ts
}
// Update call state based on packet
s.updateState(flow, p)

View File

@@ -4,6 +4,7 @@ import (
"fmt"
"strconv"
"strings"
"time"
"telephony-inspector/internal/capture"
"telephony-inspector/internal/config"
@@ -99,6 +100,30 @@ type Styles struct {
Box lipgloss.Style
PacketRow lipgloss.Style
CallFlow lipgloss.Style
// SIP Styles
MethodInvite lipgloss.Style
MethodBye lipgloss.Style
MethodRegister lipgloss.Style
MethodOther lipgloss.Style
Status1xx lipgloss.Style
Status2xx lipgloss.Style
Status3xx lipgloss.Style
Status4xx lipgloss.Style
Status5xx lipgloss.Style
Status6xx lipgloss.Style
NodeLabel lipgloss.Style
NodePBX lipgloss.Style
NodeProxy lipgloss.Style
NodeGateway lipgloss.Style
NodeCarrier lipgloss.Style
NodeEndpoint lipgloss.Style
NodeDefault lipgloss.Style
ArrowOut lipgloss.Style
ArrowIn lipgloss.Style
}
func defaultStyles() Styles {
@@ -135,6 +160,60 @@ func defaultStyles() Styles {
Border(lipgloss.NormalBorder()).
BorderForeground(lipgloss.Color("#44475A")).
Padding(0, 1),
// SIP Styles Initialization
MethodInvite: lipgloss.NewStyle().Foreground(lipgloss.Color("#8BE9FD")).Bold(true), // Cyan
MethodBye: lipgloss.NewStyle().Foreground(lipgloss.Color("#FF5555")).Bold(true), // Red
MethodRegister: lipgloss.NewStyle().Foreground(lipgloss.Color("#50FA7B")).Bold(true), // Green
MethodOther: lipgloss.NewStyle().Foreground(lipgloss.Color("#BD93F9")).Bold(true), // Purple
Status1xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#F1FA8C")), // Yellow
Status2xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#50FA7B")), // Green
Status3xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#8BE9FD")), // Cyan
Status4xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#FF5555")), // Red
Status5xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#FF5555")).Bold(true), // Red Bold
Status6xx: lipgloss.NewStyle().Foreground(lipgloss.Color("#FF5555")).Bold(true).Underline(true),
NodeLabel: lipgloss.NewStyle().
Foreground(lipgloss.Color("#000000")).
Background(lipgloss.Color("#BD93F9")). // Purple background
Padding(0, 1).
Bold(true),
// Node Styles with different background colors
NodePBX: lipgloss.NewStyle().
Foreground(lipgloss.Color("#FFFFFF")).
Background(lipgloss.Color("#FF79C6")). // Pink
Padding(0, 1).
Bold(true),
NodeProxy: lipgloss.NewStyle().
Foreground(lipgloss.Color("#000000")).
Background(lipgloss.Color("#8BE9FD")). // Cyan
Padding(0, 1).
Bold(true),
NodeGateway: lipgloss.NewStyle().
Foreground(lipgloss.Color("#000000")).
Background(lipgloss.Color("#F1FA8C")). // Yellow
Padding(0, 1).
Bold(true),
NodeCarrier: lipgloss.NewStyle().
Foreground(lipgloss.Color("#FFFFFF")).
Background(lipgloss.Color("#BD93F9")). // Purple
Padding(0, 1).
Bold(true),
NodeEndpoint: lipgloss.NewStyle().
Foreground(lipgloss.Color("#FFFFFF")).
Background(lipgloss.Color("#6272A4")). // Grey/Blue
Padding(0, 1).
Bold(true),
NodeDefault: lipgloss.NewStyle().
Foreground(lipgloss.Color("#FFFFFF")).
Background(lipgloss.Color("#44475A")). // Grey
Padding(0, 1).
Bold(true),
ArrowOut: lipgloss.NewStyle().Foreground(lipgloss.Color("#FF79C6")), // Pink
ArrowIn: lipgloss.NewStyle().Foreground(lipgloss.Color("#F1FA8C")), // Yellow
}
}
@@ -281,6 +360,12 @@ func (m *Model) handleViewKeys(msg tea.KeyMsg) tea.Cmd {
}
case "d":
m.disconnect()
case "p":
if !m.capturing {
m.fileBrowser = NewFileBrowser("", ".pcap")
m.subView = SubViewFileBrowser
return nil
}
}
case ViewAnalysis:
@@ -608,6 +693,8 @@ func (m Model) renderAddNodeForm() string {
b.WriteString("\n")
}
b.WriteString("\n")
b.WriteString(m.styles.Help.Render("Node Types: PBX, Proxy, SBC, Carrier, Handset, Firewall"))
b.WriteString("\n")
b.WriteString(m.styles.Help.Render("Tab navigate • Enter submit • Esc cancel"))
return b.String()
}
@@ -627,6 +714,11 @@ func (m Model) renderCallDetail() string {
b.WriteString(fmt.Sprintf("From: %s\n", flow.From))
b.WriteString(fmt.Sprintf("To: %s\n", flow.To))
b.WriteString(fmt.Sprintf("State: %s\n", flow.State))
// Calculate and display duration
duration := flow.EndTime.Sub(flow.StartTime)
b.WriteString(fmt.Sprintf("Duration: %s\n", duration.Round(time.Millisecond)))
b.WriteString(fmt.Sprintf("Packets: %d\n\n", len(flow.Packets)))
// Network Summary Section
@@ -634,8 +726,19 @@ func (m Model) renderCallDetail() string {
// Find first packet to get initial IPs
if len(flow.Packets) > 0 {
first := flow.Packets[0]
srcLabel := m.networkMap.LabelForIP(first.SourceIP)
if srcLabel != first.SourceIP {
// Find node type to apply style
node := m.networkMap.FindByIP(first.SourceIP)
srcLabel = m.styleForNode(node).Render(srcLabel)
}
dstLabel := m.networkMap.LabelForIP(first.DestIP)
if dstLabel != first.DestIP {
node := m.networkMap.FindByIP(first.DestIP)
dstLabel = m.styleForNode(node).Render(dstLabel)
}
b.WriteString(fmt.Sprintf(" Source: %s (%s:%d)\n", srcLabel, first.SourceIP, first.SourcePort))
b.WriteString(fmt.Sprintf(" Destination: %s (%s:%d)\n", dstLabel, first.DestIP, first.DestPort))
@@ -645,23 +748,64 @@ func (m Model) renderCallDetail() string {
b.WriteString("Transaction Flow:\n")
for i, pkt := range flow.Packets {
arrow := "→"
arrowStyle := m.styles.ArrowOut
// Simple direction indicator based on whether it matches initial source
if len(flow.Packets) > 0 && pkt.SourceIP != flow.Packets[0].SourceIP {
arrow = "←"
arrowStyle = m.styles.ArrowIn
}
// Style the packet summary (Method or Status)
var summaryStyle lipgloss.Style
if pkt.IsRequest {
switch pkt.Method {
case sip.MethodINVITE:
summaryStyle = m.styles.MethodInvite
case sip.MethodBYE, sip.MethodCANCEL:
summaryStyle = m.styles.MethodBye
case sip.MethodREGISTER:
summaryStyle = m.styles.MethodRegister
default:
summaryStyle = m.styles.MethodOther
}
} else {
switch {
case pkt.StatusCode >= 100 && pkt.StatusCode < 200:
summaryStyle = m.styles.Status1xx
case pkt.StatusCode >= 200 && pkt.StatusCode < 300:
summaryStyle = m.styles.Status2xx
case pkt.StatusCode >= 300 && pkt.StatusCode < 400:
summaryStyle = m.styles.Status3xx
case pkt.StatusCode >= 400 && pkt.StatusCode < 500:
summaryStyle = m.styles.Status4xx
case pkt.StatusCode >= 500 && pkt.StatusCode < 600:
summaryStyle = m.styles.Status5xx
default:
summaryStyle = m.styles.Status6xx
}
}
// Format timestamp
ts := pkt.Timestamp.Format("15:04:05.000")
// Clean packet info line (Timestamp + Arrow + Method/Status)
b.WriteString(fmt.Sprintf(" %d. [%s] %s %s\n", i+1, ts, arrow, pkt.Summary()))
b.WriteString(fmt.Sprintf(" %d. [%s] %s %s\n",
i+1,
ts,
arrowStyle.Render(arrow),
summaryStyle.Render(pkt.Summary())))
// Show SDP info if present
if pkt.SDP != nil {
mediaIP := pkt.SDP.GetSDPMediaIP()
if mediaIP != "" {
label := m.networkMap.LabelForIP(mediaIP)
b.WriteString(fmt.Sprintf(" SDP Media: %s (%s)\n", mediaIP, label))
if label != mediaIP {
node := m.networkMap.FindByIP(mediaIP)
label = m.styleForNode(node).Render(label)
}
b.WriteString(fmt.Sprintf(" SDP Media: %s %s\n", mediaIP, label))
}
}
}
@@ -810,7 +954,7 @@ func (m Model) viewCapture() string {
// Help
var help string
if m.captureMode == CaptureModeNone {
help = "[c] Choose mode [l] Local [r] Remote SSH [q] Quit"
help = "[c] Choose mode [l] Local [r] Remote SSH [p] Pcap Import [q] Quit"
} else if !m.capturing {
help = "[s] Start [c] Change mode [d] Disconnect [q] Quit"
} else {
@@ -949,3 +1093,32 @@ func extractUser(sipAddr string) string {
}
return sipAddr
}
// styleForNode returns the style for a given node type
func (m Model) styleForNode(node *config.NetworkNode) lipgloss.Style {
if node == nil {
return m.styles.NodeDefault
}
switch node.Type {
case config.NodeTypePBX:
return m.styles.NodePBX
case config.NodeTypeProxy:
return m.styles.NodeProxy
case config.NodeTypeGateway:
return m.styles.NodeGateway
case config.NodeTypeMediaServer:
// Reusing Proxy style for MediaServer if no specific one defined
return m.styles.NodeProxy
case config.NodeTypeEndpoint:
return m.styles.NodeEndpoint
case config.NodeTypeUnknown:
return m.styles.NodeDefault
default:
// Attempt to match by name if type is custom or carrier
lowerName := strings.ToLower(node.Name)
if strings.Contains(lowerName, "carrier") || strings.Contains(lowerName, "provider") {
return m.styles.NodeCarrier
}
return m.styles.NodeDefault
}
}

View File

@@ -1,52 +0,0 @@
[14:18:33.982] [INFO] Logger initialized: logs\2026-01-19_14-18-33.log
[14:18:33.986] [INFO] Starting Telephony Inspector
[14:18:40.383] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\test2.pcap
[14:18:40.387] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\test2.pcap
[14:18:40.391] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:18:40.395] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:18:40.399] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00022a150 0xc00034a000 0xc000234100 0xc000232090]
[14:18:40.402] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:18:40.407] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060
[14:18:40.409] [DEBUG] PcapReader: Packet 1 application layer, payload length: 528
[14:18:40.411] [DEBUG] PcapReader: Packet 1 payload preview: "v=0\r\no=- 3977820639 3977820639 IN IP4 192.168.0.164\r\ns=pjmedia\r\nb=AS:84\r\nt=0 0\r\na=X-nat:0\r\nm=audio 4"
[14:18:40.413] [DEBUG] PcapReader: Packet 1 is not SIP
[14:18:40.415] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00022a1c0 0xc00034a0a0 0xc000234180 0xc000232120]
[14:18:40.417] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:18:40.419] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416
[14:18:40.421] [DEBUG] PcapReader: Packet 2 application layer, payload length: 0
[14:18:40.423] [DEBUG] PcapReader: Packet 2 is not SIP
[14:18:40.425] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00022a230 0xc00034a140 0xc000234200 0xc0002321b0]
[14:18:40.426] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:18:40.428] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416
[14:18:40.431] [DEBUG] PcapReader: Packet 3 application layer, payload length: 375
[14:18:40.433] [DEBUG] PcapReader: Packet 3 payload preview: "v=0\r\no=- 3977820639 3977820641 IN IP4 192.168.0.162\r\ns=Asterisk\r\nc=IN IP4 192.168.0.162\r\nt=0 0\r\nm=au"
[14:18:40.434] [DEBUG] PcapReader: Packet 3 is not SIP
[14:18:40.436] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00022a2a0 0xc00034a1e0 0xc000234280 0xc000232240]
[14:18:40.439] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:18:40.441] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060
[14:18:40.443] [DEBUG] PcapReader: Packet 4 application layer, payload length: 0
[14:18:40.444] [DEBUG] PcapReader: Packet 4 is not SIP
[14:18:40.446] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00022a310 0xc00034a280 0xc000234300 0xc0002322d0]
[14:18:40.448] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:18:40.450] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060
[14:18:40.451] [DEBUG] PcapReader: Packet 5 application layer, payload length: 319
[14:18:40.454] [DEBUG] PcapReader: Packet 5 payload preview: "v=0\r\no=- 3977820639 3977820640 IN IP4 192.168.0.164\r\ns=pjmedia\r\nb=AS:84\r\nt=0 0\r\na=X-nat:0\r\nm=audio 4"
[14:18:40.456] [DEBUG] PcapReader: Packet 5 is not SIP
[14:18:40.457] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00022a380 0xc00034a320 0xc000234380 0xc000232360]
[14:18:40.459] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:18:40.461] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416
[14:18:40.462] [DEBUG] PcapReader: Packet 6 application layer, payload length: 239
[14:18:40.465] [DEBUG] PcapReader: Packet 6 payload preview: "v=0\r\no=- 3977820639 3977820642 IN IP4 192.168.0.162\r\ns=Asterisk\r\nc=IN IP4 192.168.0.162\r\nt=0 0\r\nm=au"
[14:18:40.467] [DEBUG] PcapReader: Packet 6 is not SIP
[14:18:40.468] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00022a3f0 0xc00034a3c0 0xc000234400 0xc0002323f0]
[14:18:40.470] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:18:40.472] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060
[14:18:40.474] [DEBUG] PcapReader: Packet 7 application layer, payload length: 0
[14:18:40.476] [DEBUG] PcapReader: Packet 7 is not SIP
[14:18:40.478] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00022a460 0xc00034a460 0xc000234480 0xc000232480]
[14:18:40.480] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:18:40.481] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416
[14:18:40.483] [DEBUG] PcapReader: Packet 8 application layer, payload length: 0
[14:18:40.485] [DEBUG] PcapReader: Packet 8 is not SIP
[14:18:40.487] [INFO] PcapReader: Finished reading. Total packets: 8, SIP packets: 0
[14:23:18.995] [INFO] Telephony Inspector exited normally

View File

@@ -1,237 +0,0 @@
[14:23:22.124] [INFO] Logger initialized: logs\2026-01-19_14-23-22.log
[14:23:22.128] [INFO] Starting Telephony Inspector
[14:23:26.188] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\test.pcapng
[14:23:26.193] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\test.pcapng
[14:23:26.197] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:23:26.200] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:23:26.204] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00048c0e0 0xc00049c000 0xc000332100 0xc00049e000]
[14:23:26.208] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.212] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1154
[14:23:26.214] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:145632@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094"
[14:23:26.215] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:23:26.218] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:23:26.220] [INFO] PcapReader: Found SIP packet 1: INVITE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.221] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00048c150 0xc00049c0a0 0xc000332180 0xc00049e090]
[14:23:26.223] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.225] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:23:26.227] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001"
[14:23:26.229] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.231] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:23:26.233] [INFO] PcapReader: Found SIP packet 2: 100 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.234] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00048c1c0 0xc00049c140 0xc000332200 0xc00049e120]
[14:23:26.236] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.238] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:23:26.240] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.242] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.244] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:23:26.246] [INFO] PcapReader: Found SIP packet 3: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.248] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00048c230 0xc00049c1e0 0xc000332280 0xc00049e1b0]
[14:23:26.249] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.251] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:23:26.253] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj5a53b67ee71748bf944b029063d2d8b4\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
[14:23:26.255] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:23:26.257] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:23:26.259] [INFO] PcapReader: Found SIP packet 4: ACK b8060bf9ee0d43cbb60d714e22046659
[14:23:26.261] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00048c2a0 0xc00049c280 0xc000332300 0xc00049e240]
[14:23:26.263] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.264] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 871
[14:23:26.267] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3"
[14:23:26.269] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:23:26.271] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:23:26.273] [INFO] PcapReader: Found SIP packet 5: UPDATE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.275] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00048c310 0xc00049c320 0xc000332380 0xc00049e2d0]
[14:23:26.276] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.278] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:23:26.280] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.282] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.284] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:23:26.286] [INFO] PcapReader: Found SIP packet 6: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.288] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00048c380 0xc00049c3c0 0xc000332400 0xc00049e360]
[14:23:26.289] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:23:26.291] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:23:26.293] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
[14:23:26.295] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:23:26.297] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:23:26.299] [INFO] PcapReader: Found SIP packet 7: BYE b8060bf9ee0d43cbb60d714e22046659
[14:23:26.301] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00048c3f0 0xc00049c460 0xc000332480 0xc00049e3f0]
[14:23:26.303] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:23:26.305] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:23:26.306] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
[14:23:26.308] [DEBUG] isSIPPayload: Detected SIP response
[14:23:26.310] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:23:26.311] [INFO] PcapReader: Found SIP packet 8: 200 b8060bf9ee0d43cbb60d714e22046659
[14:23:26.314] [INFO] PcapReader: Finished reading. Total packets: 8, SIP packets: 8
[14:25:08.950] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:08.953] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:08.955] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:25:08.957] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:25:08.959] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0005320e0 0xc0001121e0 0xc000154080 0xc000232090]
[14:25:08.961] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:08.963] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:25:08.965] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:25:08.967] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:08.969] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:25:08.971] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:25:08.973] [DEBUG] PcapReader: Processing packet 2, layers: [0xc000532150 0xc000112460 0xc000154100 0xc000232120]
[14:25:08.975] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:08.976] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:25:08.978] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:25:08.980] [DEBUG] isSIPPayload: Detected SIP response
[14:25:08.981] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:25:08.984] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:25:08.986] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0005321c0 0xc0001125a0 0xc000154180 0xc0002321b0]
[14:25:08.988] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:08.990] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:25:08.991] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:08.993] [DEBUG] isSIPPayload: Detected SIP response
[14:25:08.995] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:25:08.997] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:25:08.998] [DEBUG] PcapReader: Processing packet 4, layers: [0xc000532230 0xc0001126e0 0xc000154200 0xc000232240]
[14:25:09.001] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.006] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:25:09.008] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:09.010] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.012] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:25:09.014] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:25:09.016] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0005322a0 0xc000112780 0xc000154280 0xc0002322d0]
[14:25:09.018] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.019] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:25:09.021] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:25:09.023] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.025] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:25:09.027] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:25:09.029] [DEBUG] PcapReader: Processing packet 6, layers: [0xc000532310 0xc000112820 0xc000154300 0xc000232360]
[14:25:09.031] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.032] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:25:09.034] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:09.035] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.038] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:25:09.040] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:25:09.041] [DEBUG] PcapReader: Processing packet 7, layers: [0xc000532380 0xc0001128c0 0xc000154380 0xc0002323f0]
[14:25:09.043] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.045] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:25:09.047] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:09.048] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.051] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:25:09.052] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:25:09.054] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0005323f0 0xc000112960 0xc000154400 0xc000232480]
[14:25:09.056] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.058] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:25:09.059] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:09.061] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.064] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:25:09.065] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:25:09.067] [DEBUG] PcapReader: Processing packet 9, layers: [0xc000532460 0xc000112a00 0xc000154480 0xc000232510]
[14:25:09.069] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.071] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:25:09.073] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:25:09.074] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:09.076] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:25:09.078] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.080] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0005324d0 0xc000112aa0 0xc000154580 0xc0002325a0]
[14:25:09.081] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.083] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:25:09.085] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:25:09.087] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.089] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:25:09.090] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.092] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000532540 0xc000112b40 0xc000154600 0xc000232630]
[14:25:09.094] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.096] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:25:09.098] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.100] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.101] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:25:09.103] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.105] [DEBUG] PcapReader: Processing packet 12, layers: [0xc0005325b0 0xc000112be0 0xc000154680 0xc0002326c0]
[14:25:09.107] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.108] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:25:09.110] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:09.112] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.114] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:25:09.116] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:25:09.118] [DEBUG] PcapReader: Processing packet 13, layers: [0xc000532620 0xc000112c80 0xc000154700 0xc000232750]
[14:25:09.120] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.121] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:25:09.123] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:25:09.125] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.127] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:25:09.129] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.131] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000532690 0xc000112d20 0xc000154780 0xc0002327e0]
[14:25:09.132] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.134] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:25:09.136] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.138] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.139] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:25:09.141] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.143] [DEBUG] PcapReader: Processing packet 15, layers: [0xc000532700 0xc000112dc0 0xc000154800 0xc000232870]
[14:25:09.145] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.147] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:25:09.148] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:09.150] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.152] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:25:09.154] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:25:09.156] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000532770 0xc000112e60 0xc000154880 0xc000232900]
[14:25:09.157] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.159] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:25:09.162] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:09.163] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.165] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:25:09.167] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:09.169] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0005327e0 0xc000112f00 0xc000154900 0xc000232990]
[14:25:09.171] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.173] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:25:09.175] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:09.176] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:09.178] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:25:09.180] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:25:09.181] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000532850 0xc000112fa0 0xc000154980 0xc000232a20]
[14:25:09.184] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.186] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:25:09.187] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:25:09.189] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.191] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:25:09.193] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:25:09.195] [DEBUG] PcapReader: Processing packet 19, layers: [0xc0005328c0 0xc000113040 0xc000154a00 0xc000232ab0]
[14:25:09.197] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.198] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:25:09.201] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.202] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.204] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:25:09.206] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.208] [DEBUG] PcapReader: Processing packet 20, layers: [0xc000532930 0xc0001130e0 0xc000154a80 0xc000232b40]
[14:25:09.209] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.212] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:25:09.213] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:09.215] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:09.217] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:25:09.219] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:25:09.221] [DEBUG] PcapReader: Processing packet 21, layers: [0xc0005329a0 0xc000113180 0xc000154b00 0xc000232bd0]
[14:25:09.223] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.224] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:25:09.226] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:09.228] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:09.230] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:25:09.231] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:25:09.233] [DEBUG] PcapReader: Processing packet 22, layers: [0xc000532a10 0xc000113220 0xc000154b80 0xc000232c60]
[14:25:09.235] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.237] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:25:09.239] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.241] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.242] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:25:09.245] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.246] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000532a80 0xc0001132c0 0xc000154c00 0xc000232cf0]
[14:25:09.248] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:09.250] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:25:09.252] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:09.253] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:09.255] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:25:09.257] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:25:09.259] [DEBUG] PcapReader: Processing packet 24, layers: [0xc000532af0 0xc000113360 0xc000154c80 0xc000232d80]
[14:25:09.261] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:09.263] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:25:09.264] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:09.266] [DEBUG] isSIPPayload: Detected SIP response
[14:25:09.268] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:25:09.270] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:25:09.271] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:25:29.806] [INFO] Telephony Inspector exited normally

View File

@@ -1,176 +0,0 @@
[14:25:30.903] [INFO] Logger initialized: logs\2026-01-19_14-25-30.log
[14:25:30.906] [INFO] Starting Telephony Inspector
[14:25:35.313] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:35.317] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:25:35.320] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:25:35.324] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:25:35.327] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00043a230 0xc00044e000 0xc00031a280 0xc000450000]
[14:25:35.331] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.335] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:25:35.337] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:25:35.338] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.340] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:25:35.342] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:25:35.344] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00043a2a0 0xc00044e0a0 0xc00031a300 0xc000450090]
[14:25:35.346] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.348] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:25:35.350] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:25:35.351] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.353] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:25:35.355] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:25:35.357] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00043a310 0xc00044e140 0xc00031a380 0xc000450120]
[14:25:35.359] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.361] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:25:35.363] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.365] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.366] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:25:35.368] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.370] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00043a380 0xc00044e1e0 0xc00031a400 0xc0004501b0]
[14:25:35.372] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.374] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:25:35.376] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:35.378] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.379] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:25:35.381] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:25:35.383] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00043a3f0 0xc00044e280 0xc00031a480 0xc000450240]
[14:25:35.385] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.387] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:25:35.389] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:25:35.390] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.392] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:25:35.394] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:25:35.396] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00043a460 0xc00044e320 0xc00031a500 0xc0004502d0]
[14:25:35.398] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.399] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:25:35.401] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.403] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.405] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:25:35.406] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.408] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00043a4d0 0xc00044e3c0 0xc00031a580 0xc000450360]
[14:25:35.410] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.412] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:25:35.414] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:25:35.415] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.417] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:25:35.419] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:25:35.421] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00043a540 0xc00044e460 0xc00031a600 0xc0004503f0]
[14:25:35.439] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.440] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:25:35.442] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:25:35.444] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.446] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:25:35.448] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:25:35.450] [DEBUG] PcapReader: Processing packet 9, layers: [0xc00043a5b0 0xc00044e500 0xc00031a680 0xc000450480]
[14:25:35.451] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.453] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:25:35.454] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:25:35.457] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.459] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:25:35.461] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.462] [DEBUG] PcapReader: Processing packet 10, layers: [0xc00043a620 0xc00044e5a0 0xc00031a700 0xc000450510]
[14:25:35.465] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.467] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:25:35.468] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:25:35.470] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.472] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:25:35.474] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.476] [DEBUG] PcapReader: Processing packet 11, layers: [0xc00043a690 0xc00044e640 0xc00031a780 0xc0004505a0]
[14:25:35.478] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.480] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:25:35.481] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.483] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.485] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:25:35.487] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.489] [DEBUG] PcapReader: Processing packet 12, layers: [0xc00043a700 0xc00044e6e0 0xc00031a800 0xc000450630]
[14:25:35.491] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.492] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:25:35.494] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:35.496] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.498] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:25:35.500] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:25:35.502] [DEBUG] PcapReader: Processing packet 13, layers: [0xc00043a770 0xc00044e780 0xc00031a880 0xc0004506c0]
[14:25:35.504] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.505] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:25:35.507] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:25:35.509] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.511] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:25:35.513] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.515] [DEBUG] PcapReader: Processing packet 14, layers: [0xc00043a7e0 0xc00044e820 0xc00031a900 0xc000450750]
[14:25:35.517] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.519] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:25:35.521] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.522] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.524] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:25:35.526] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.528] [DEBUG] PcapReader: Processing packet 15, layers: [0xc00043a850 0xc00044e8c0 0xc00031a980 0xc0004507e0]
[14:25:35.530] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.532] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:25:35.534] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:25:35.535] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.537] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:25:35.539] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:25:35.541] [DEBUG] PcapReader: Processing packet 16, layers: [0xc00043a8c0 0xc00044e960 0xc00031aa00 0xc000450870]
[14:25:35.543] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.545] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:25:35.546] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:25:35.548] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.550] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:25:35.552] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:25:35.554] [DEBUG] PcapReader: Processing packet 17, layers: [0xc00043a930 0xc00044ea00 0xc00031aa80 0xc000450900]
[14:25:35.555] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.557] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:25:35.559] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:35.561] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:25:35.563] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:25:35.565] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:25:35.567] [DEBUG] PcapReader: Processing packet 18, layers: [0xc00043a9a0 0xc00044eaa0 0xc00031ab00 0xc000450990]
[14:25:35.568] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.570] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:25:35.572] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:25:35.574] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.576] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:25:35.578] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:25:35.579] [DEBUG] PcapReader: Processing packet 19, layers: [0xc00043aa10 0xc00044eb40 0xc00031ab80 0xc000450a20]
[14:25:35.581] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.583] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:25:35.585] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.587] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.589] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:25:35.591] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.592] [DEBUG] PcapReader: Processing packet 20, layers: [0xc00043aa80 0xc00044ebe0 0xc00031ac00 0xc000450ab0]
[14:25:35.594] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.596] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:25:35.598] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:35.600] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:25:35.602] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:25:35.604] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:25:35.605] [DEBUG] PcapReader: Processing packet 21, layers: [0xc00043aaf0 0xc00044ec80 0xc00031ac80 0xc000450b40]
[14:25:35.607] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.609] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:25:35.611] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:25:35.613] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:25:35.615] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:25:35.617] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:25:35.618] [DEBUG] PcapReader: Processing packet 22, layers: [0xc00043ab60 0xc00044ed20 0xc00031ad00 0xc000450bd0]
[14:25:35.620] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.622] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:25:35.625] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.627] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.629] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:25:35.630] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.632] [DEBUG] PcapReader: Processing packet 23, layers: [0xc00043abd0 0xc00044edc0 0xc00031ad80 0xc000450c60]
[14:25:35.634] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:25:35.636] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:25:35.638] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:25:35.640] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:25:35.642] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:25:35.644] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:25:35.645] [DEBUG] PcapReader: Processing packet 24, layers: [0xc00043ac40 0xc00044ee60 0xc00031ae00 0xc000450cf0]
[14:25:35.647] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:25:35.649] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:25:35.651] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:25:35.652] [DEBUG] isSIPPayload: Detected SIP response
[14:25:35.654] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:25:35.656] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:25:35.658] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:28:06.938] [INFO] Telephony Inspector exited normally

View File

@@ -1,176 +0,0 @@
[14:28:08.952] [INFO] Logger initialized: logs\2026-01-19_14-28-08.log
[14:28:08.956] [INFO] Starting Telephony Inspector
[14:28:12.252] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:28:12.256] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:28:12.260] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:28:12.264] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:28:12.267] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0000e3b20 0xc0000b8640 0xc0000e0280 0xc00037e000]
[14:28:12.272] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.275] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:28:12.277] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:28:12.280] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:28:12.281] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:28:12.283] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:28:12.285] [DEBUG] PcapReader: Processing packet 2, layers: [0xc0000e3b90 0xc0000b86e0 0xc0000e0300 0xc00037e090]
[14:28:12.286] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.289] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:28:12.290] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:28:12.292] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.294] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:28:12.296] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:28:12.298] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0000e3c00 0xc0000b8780 0xc0000e0380 0xc00037e120]
[14:28:12.300] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.302] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:28:12.304] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:28:12.306] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.307] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:28:12.309] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:28:12.311] [DEBUG] PcapReader: Processing packet 4, layers: [0xc0000e3c70 0xc0000b8820 0xc0000e0400 0xc00037e1b0]
[14:28:12.313] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.315] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:28:12.317] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:28:12.319] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:28:12.320] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:28:12.322] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:28:12.324] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0000e3ce0 0xc0000b88c0 0xc0000e0480 0xc00037e240]
[14:28:12.326] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.328] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:28:12.330] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:28:12.332] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:28:12.334] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:28:12.335] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:28:12.337] [DEBUG] PcapReader: Processing packet 6, layers: [0xc0000e3d50 0xc0000b8960 0xc0000e0500 0xc00037e2d0]
[14:28:12.339] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.341] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:28:12.342] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:28:12.345] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.346] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:28:12.348] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:28:12.350] [DEBUG] PcapReader: Processing packet 7, layers: [0xc0000e3dc0 0xc0000b8a00 0xc0000e0580 0xc00037e360]
[14:28:12.352] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.354] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:28:12.356] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:28:12.358] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:28:12.360] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:28:12.361] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:28:12.363] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0000e3e30 0xc0000b8aa0 0xc0000e0600 0xc00037e3f0]
[14:28:12.365] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.367] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:28:12.369] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:28:12.371] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.373] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:28:12.374] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:28:12.376] [DEBUG] PcapReader: Processing packet 9, layers: [0xc0000e3ea0 0xc0000b8b40 0xc0000e0680 0xc00037e480]
[14:28:12.378] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.380] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:28:12.382] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:28:12.384] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:28:12.386] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:28:12.388] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:28:12.390] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0000e3f10 0xc0000b8be0 0xc0000e0700 0xc00037e510]
[14:28:12.391] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.394] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:28:12.395] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:28:12.397] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.399] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:28:12.401] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:28:12.403] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000498000 0xc0000b8c80 0xc0000e0780 0xc00037e5a0]
[14:28:12.405] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.407] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:28:12.408] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:28:12.410] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.413] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:28:12.414] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:28:12.416] [DEBUG] PcapReader: Processing packet 12, layers: [0xc000498070 0xc0000b8d20 0xc0000e0800 0xc00037e630]
[14:28:12.418] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.419] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:28:12.421] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:28:12.423] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:28:12.425] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:28:12.427] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:28:12.429] [DEBUG] PcapReader: Processing packet 13, layers: [0xc0004980e0 0xc0000b8dc0 0xc0000e0880 0xc00037e6c0]
[14:28:12.431] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.433] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:28:12.434] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:28:12.436] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:28:12.438] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:28:12.440] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:28:12.442] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000498150 0xc0000b8e60 0xc0000e0900 0xc00037e750]
[14:28:12.444] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.446] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:28:12.448] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:28:12.449] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.451] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:28:12.453] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:28:12.455] [DEBUG] PcapReader: Processing packet 15, layers: [0xc0004981c0 0xc0000b8f00 0xc0000e0980 0xc00037e7e0]
[14:28:12.457] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.459] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:28:12.461] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:28:12.462] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:28:12.464] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:28:12.466] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:28:12.468] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000498230 0xc0000b8fa0 0xc0000e0a00 0xc00037e870]
[14:28:12.470] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.472] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:28:12.474] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:28:12.476] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.482] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:28:12.484] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:28:12.485] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0004982a0 0xc0000b9040 0xc0000e0a80 0xc00037e900]
[14:28:12.487] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.489] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:28:12.492] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:28:12.493] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:28:12.495] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:28:12.497] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:28:12.499] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000498310 0xc0000b90e0 0xc0000e0b00 0xc00037e990]
[14:28:12.501] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.504] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:28:12.505] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:28:12.507] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.509] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:28:12.511] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:28:12.513] [DEBUG] PcapReader: Processing packet 19, layers: [0xc000498380 0xc0000b9180 0xc0000e0b80 0xc00037ea20]
[14:28:12.515] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.517] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:28:12.518] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:28:12.521] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.523] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:28:12.524] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:28:12.526] [DEBUG] PcapReader: Processing packet 20, layers: [0xc0004983f0 0xc0000b9220 0xc0000e0c00 0xc00037eab0]
[14:28:12.528] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.530] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:28:12.532] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:28:12.534] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:28:12.535] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:28:12.537] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:28:12.539] [DEBUG] PcapReader: Processing packet 21, layers: [0xc000498460 0xc0000b92c0 0xc0000e0c80 0xc00037eb40]
[14:28:12.541] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.543] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:28:12.545] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:28:12.547] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:28:12.548] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:28:12.550] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:28:12.552] [DEBUG] PcapReader: Processing packet 22, layers: [0xc0004984d0 0xc0000b9360 0xc0000e0d00 0xc00037ebd0]
[14:28:12.554] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.555] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:28:12.558] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:28:12.559] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.561] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:28:12.563] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:28:12.565] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000498540 0xc0000b9400 0xc0000e0d80 0xc00037ec60]
[14:28:12.566] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:28:12.568] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:28:12.570] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:28:12.572] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:28:12.574] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:28:12.576] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:28:12.578] [DEBUG] PcapReader: Processing packet 24, layers: [0xc0004985b0 0xc0000b94a0 0xc0000e0e00 0xc00037ecf0]
[14:28:12.579] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:28:12.581] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:28:12.583] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:28:12.585] [DEBUG] isSIPPayload: Detected SIP response
[14:28:12.587] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:28:12.588] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:28:12.591] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:32:56.152] [INFO] Telephony Inspector exited normally

View File

@@ -1,176 +0,0 @@
[14:32:58.290] [INFO] Logger initialized: logs\2026-01-19_14-32-58.log
[14:32:58.294] [INFO] Starting Telephony Inspector
[14:33:08.977] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
[14:33:08.981] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
[14:33:08.984] [INFO] PcapReader: File opened successfully, link type: Ethernet
[14:33:08.989] [DEBUG] PcapReader: BPF filter set for SIP ports
[14:33:08.993] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0007da0e0 0xc0000b83c0 0xc0007fa000 0xc00022a090]
[14:33:08.996] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.001] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
[14:33:09.002] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
[14:33:09.004] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:33:09.006] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
[14:33:09.008] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
[14:33:09.010] [DEBUG] PcapReader: Processing packet 2, layers: [0xc0007da150 0xc0000b8500 0xc0007fa080 0xc00022a120]
[14:33:09.012] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.014] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
[14:33:09.015] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
[14:33:09.017] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.019] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
[14:33:09.021] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
[14:33:09.023] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0007da1c0 0xc0000b86e0 0xc0007fa100 0xc00022a1b0]
[14:33:09.025] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.027] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
[14:33:09.029] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:33:09.030] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.033] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
[14:33:09.034] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
[14:33:09.036] [DEBUG] PcapReader: Processing packet 4, layers: [0xc0007da230 0xc0000b8780 0xc0007fa180 0xc00022a240]
[14:33:09.038] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.040] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
[14:33:09.042] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:33:09.044] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:33:09.046] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
[14:33:09.047] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
[14:33:09.050] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0007da2a0 0xc0000b8820 0xc0007fa200 0xc00022a2d0]
[14:33:09.051] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.053] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
[14:33:09.055] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
[14:33:09.057] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:33:09.059] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
[14:33:09.061] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
[14:33:09.063] [DEBUG] PcapReader: Processing packet 6, layers: [0xc001084000 0xc000c320a0 0xc001086000 0xc001088000]
[14:33:09.065] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.066] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
[14:33:09.068] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:33:09.070] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.072] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
[14:33:09.074] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
[14:33:09.076] [DEBUG] PcapReader: Processing packet 7, layers: [0xc001084070 0xc000c32140 0xc001086080 0xc001088090]
[14:33:09.077] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.080] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
[14:33:09.082] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
[14:33:09.083] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:33:09.085] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
[14:33:09.087] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
[14:33:09.089] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0010840e0 0xc000c321e0 0xc001086100 0xc001088120]
[14:33:09.091] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.092] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
[14:33:09.094] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
[14:33:09.100] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.102] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
[14:33:09.104] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
[14:33:09.106] [DEBUG] PcapReader: Processing packet 9, layers: [0xc001084150 0xc000c32280 0xc001086180 0xc0010881b0]
[14:33:09.108] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.109] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
[14:33:09.112] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
[14:33:09.114] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:33:09.115] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
[14:33:09.117] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
[14:33:09.119] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0010841c0 0xc000c32320 0xc001086200 0xc001088240]
[14:33:09.121] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.122] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
[14:33:09.124] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
[14:33:09.126] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.128] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
[14:33:09.130] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
[14:33:09.132] [DEBUG] PcapReader: Processing packet 11, layers: [0xc001084230 0xc000c323c0 0xc001086280 0xc0010882d0]
[14:33:09.134] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.135] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
[14:33:09.137] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:33:09.139] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.141] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
[14:33:09.142] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
[14:33:09.144] [DEBUG] PcapReader: Processing packet 12, layers: [0xc0010842a0 0xc000c32460 0xc001086300 0xc001088360]
[14:33:09.146] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.148] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
[14:33:09.150] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:33:09.152] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:33:09.154] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
[14:33:09.156] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
[14:33:09.158] [DEBUG] PcapReader: Processing packet 13, layers: [0xc001084310 0xc000c32500 0xc001086380 0xc0010883f0]
[14:33:09.159] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.161] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
[14:33:09.163] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
[14:33:09.165] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:33:09.167] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
[14:33:09.169] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
[14:33:09.171] [DEBUG] PcapReader: Processing packet 14, layers: [0xc001084380 0xc000c325a0 0xc001086400 0xc001088480]
[14:33:09.173] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.175] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
[14:33:09.176] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:33:09.178] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.180] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
[14:33:09.182] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
[14:33:09.184] [DEBUG] PcapReader: Processing packet 15, layers: [0xc0010843f0 0xc000c32640 0xc001086480 0xc001088510]
[14:33:09.186] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.187] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
[14:33:09.189] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
[14:33:09.191] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:33:09.193] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
[14:33:09.195] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
[14:33:09.197] [DEBUG] PcapReader: Processing packet 16, layers: [0xc001084460 0xc000c326e0 0xc001086500 0xc0010885a0]
[14:33:09.199] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.201] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
[14:33:09.202] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
[14:33:09.204] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.206] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
[14:33:09.208] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
[14:33:09.210] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0010844d0 0xc000c32780 0xc001086580 0xc001088630]
[14:33:09.212] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.214] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
[14:33:09.215] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:33:09.217] [DEBUG] isSIPPayload: Detected SIP method: INVITE
[14:33:09.219] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
[14:33:09.221] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
[14:33:09.223] [DEBUG] PcapReader: Processing packet 18, layers: [0xc001084540 0xc000c32820 0xc001086600 0xc0010886c0]
[14:33:09.225] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.227] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
[14:33:09.228] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
[14:33:09.230] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.232] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
[14:33:09.233] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
[14:33:09.236] [DEBUG] PcapReader: Processing packet 19, layers: [0xc0010845b0 0xc000c328c0 0xc001086680 0xc001088750]
[14:33:09.238] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.239] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
[14:33:09.242] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:33:09.243] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.245] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
[14:33:09.247] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
[14:33:09.249] [DEBUG] PcapReader: Processing packet 20, layers: [0xc001084620 0xc000c32960 0xc001086700 0xc0010887e0]
[14:33:09.251] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.252] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
[14:33:09.255] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:33:09.256] [DEBUG] isSIPPayload: Detected SIP method: ACK
[14:33:09.258] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
[14:33:09.260] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
[14:33:09.262] [DEBUG] PcapReader: Processing packet 21, layers: [0xc001084690 0xc000c32a00 0xc001086780 0xc001088870]
[14:33:09.263] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.265] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
[14:33:09.268] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
[14:33:09.269] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
[14:33:09.271] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
[14:33:09.273] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
[14:33:09.275] [DEBUG] PcapReader: Processing packet 22, layers: [0xc001084700 0xc000c32aa0 0xc001086800 0xc001088900]
[14:33:09.277] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.278] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
[14:33:09.280] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:33:09.282] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.284] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
[14:33:09.286] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
[14:33:09.288] [DEBUG] PcapReader: Processing packet 23, layers: [0xc001084770 0xc000c32b40 0xc001086880 0xc001088990]
[14:33:09.290] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
[14:33:09.291] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
[14:33:09.293] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
[14:33:09.295] [DEBUG] isSIPPayload: Detected SIP method: BYE
[14:33:09.297] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
[14:33:09.299] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
[14:33:09.301] [DEBUG] PcapReader: Processing packet 24, layers: [0xc0010847e0 0xc000c32be0 0xc001086900 0xc001088a20]
[14:33:09.303] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
[14:33:09.304] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
[14:33:09.306] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
[14:33:09.308] [DEBUG] isSIPPayload: Detected SIP response
[14:33:09.310] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
[14:33:09.312] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
[14:33:09.314] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
[14:35:22.258] [INFO] Telephony Inspector exited normally

14
network_map.json Normal file
View File

@@ -0,0 +1,14 @@
{
"nodes": [
{
"name": "Windows",
"ip": "192.168.0.164",
"type": "Carrier"
},
{
"name": "Asterisk",
"ip": "192.168.0.162",
"type": "PBX"
}
]
}