Compare commits
37 Commits
7375539def
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
713903c463 | ||
|
|
c052cc72fb | ||
|
|
1fb7d447a4 | ||
|
|
65a7cd10f6 | ||
|
|
b7a5bede87 | ||
|
|
a5ba4d6c11 | ||
|
|
d234bfb427 | ||
|
|
6abea047d1 | ||
|
|
b2ff043923 | ||
|
|
bdf6dfc1e1 | ||
|
|
d3b31f02c8 | ||
|
|
3b73d30e27 | ||
|
|
1df4a48769 | ||
|
|
23349e2039 | ||
|
|
f5a2730bc3 | ||
|
|
a02b7533d5 | ||
|
|
daefefb5aa | ||
|
|
c4794ad787 | ||
|
|
0566cb9268 | ||
|
|
42d27c0647 | ||
|
|
751bf380d7 | ||
|
|
1344b730af | ||
|
|
ee0e827b78 | ||
|
|
ee7201ce57 | ||
|
|
0c61db8f5b | ||
|
|
cd9b0db44d | ||
|
|
f0911737f4 | ||
|
|
2d99d8ddc4 | ||
|
|
4fa44fb9c7 | ||
|
|
b8984f25a0 | ||
|
|
854cf926ed | ||
|
|
bdd6cbf72a | ||
|
|
6c80a2410e | ||
|
|
a350c3f178 | ||
|
|
5f00506758 | ||
|
|
2a8f0c633a | ||
|
|
7cb29c45e3 |
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
logs/
|
||||
223
export_20260120_222728_e06cb346194a4f9295d3a325b185912f.log
Normal file
223
export_20260120_222728_e06cb346194a4f9295d3a325b185912f.log
Normal file
@@ -0,0 +1,223 @@
|
||||
Call Detail Export
|
||||
==================
|
||||
Date: Tue, 20 Jan 2026 22:27:28 CET
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>
|
||||
State: Connected
|
||||
Duration: 2.81879s
|
||||
Packets: 8
|
||||
|
||||
Network Layer:
|
||||
Source: Windows (Carrier) (192.168.0.164:51416)
|
||||
Destination: Asterisk (PBX) (192.168.0.162:5060)
|
||||
|
||||
Network Context:
|
||||
- Windows (Carrier): 192.168.0.164
|
||||
- Asterisk (PBX): 192.168.0.162
|
||||
|
||||
Transaction Flow:
|
||||
-----------------
|
||||
01. [14:24:30.477] Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162) (INVITE line 1153)
|
||||
02. [14:24:30.478] Asterisk (PBX) (192.168.0.162) <- Windows (Carrier) (192.168.0.164) (Trying line 382)
|
||||
03. [14:24:30.479] Asterisk (PBX) (192.168.0.162) <- Windows (Carrier) (192.168.0.164) (OK line 1075)
|
||||
04. [14:24:30.479] Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162) (ACK line 371)
|
||||
05. [14:24:30.479] Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162) (UPDATE line 870)
|
||||
06. [14:24:30.480] Asterisk (PBX) (192.168.0.162) <- Windows (Carrier) (192.168.0.164) (OK line 939)
|
||||
07. [14:24:33.296] Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162) (BYE line 400)
|
||||
08. [14:24:33.296] Asterisk (PBX) (192.168.0.162) <- Windows (Carrier) (192.168.0.164) (OK line 416)
|
||||
|
||||
|
||||
Packet Details:
|
||||
---------------
|
||||
|
||||
--- Packet 1 [14:24:30.477] ---
|
||||
Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162)
|
||||
INVITE sip:123456@192.168.0.162 SIP/2.0
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6
|
||||
Max-Forwards: 70
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>
|
||||
Contact: <sip:1001@192.168.0.164:51416;ob>
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
CSeq: 12831 INVITE
|
||||
Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
|
||||
Supported: replaces, 100rel, timer, norefersub
|
||||
Session-Expires: 1800
|
||||
Min-SE: 90
|
||||
User-Agent: MicroSIP/3.21.6
|
||||
Content-Type: application/sdp
|
||||
Content-Length: 527
|
||||
|
||||
v=0
|
||||
o=- 3977821470 3977821470 IN IP4 192.168.0.164
|
||||
s=pjmedia
|
||||
b=AS:84
|
||||
t=0 0
|
||||
a=X-nat:0
|
||||
m=audio 4040 RTP/AVP 0 8 96 101 102
|
||||
c=IN IP4 192.168.0.164
|
||||
b=TIAS:64000
|
||||
a=rtcp:4041 IN IP4 192.168.0.164
|
||||
a=sendrecv
|
||||
a=rtpmap:0 PCMU/8000
|
||||
a=rtpmap:8 PCMA/8000
|
||||
a=rtpmap:96 opus/48000/2
|
||||
a=fmtp:96 maxplaybackrate=24000;sprop-maxcapturerate=24000;maxaveragebitrate=64000;useinbandfec=1
|
||||
a=rtpmap:101 telephone-event/8000
|
||||
a=fmtp:101 0-16
|
||||
a=rtpmap:102 telephone-event/48000
|
||||
a=fmtp:102 0-16
|
||||
a=ssrc:825569477 cname:1f442b6f1a4c18c5
|
||||
|
||||
|
||||
--- Packet 2 [14:24:30.478] ---
|
||||
Asterisk (PBX) (192.168.0.162) -> Windows (Carrier) (192.168.0.164)
|
||||
SIP/2.0 100 Trying
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>
|
||||
CSeq: 12831 INVITE
|
||||
Server: Asterisk PBX 18.10.0~dfsg+~cs6.10.40431411-2
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
|
||||
--- Packet 3 [14:24:30.479] ---
|
||||
Asterisk (PBX) (192.168.0.162) -> Windows (Carrier) (192.168.0.164)
|
||||
SIP/2.0 200 OK
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
CSeq: 12831 INVITE
|
||||
Server: Asterisk PBX 18.10.0~dfsg+~cs6.10.40431411-2
|
||||
Contact: <sip:192.168.0.162:5060>
|
||||
Allow: OPTIONS, REGISTER, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, MESSAGE, REFER
|
||||
Supported: 100rel, timer, replaces, norefersub
|
||||
Session-Expires: 1800;refresher=uac
|
||||
Require: timer
|
||||
Content-Type: application/sdp
|
||||
Content-Length: 375
|
||||
|
||||
v=0
|
||||
o=- 3977821470 3977821472 IN IP4 192.168.0.162
|
||||
s=Asterisk
|
||||
c=IN IP4 192.168.0.162
|
||||
t=0 0
|
||||
m=audio 12862 RTP/AVP 0 8 96 101
|
||||
a=rtpmap:0 PCMU/8000
|
||||
a=rtpmap:8 PCMA/8000
|
||||
a=rtpmap:96 opus/48000/2
|
||||
a=fmtp:96 maxplaybackrate=24000;sprop-maxcapturerate=24000;maxaveragebitrate=64000
|
||||
a=rtpmap:101 telephone-event/8000
|
||||
a=fmtp:101 0-16
|
||||
a=ptime:20
|
||||
a=maxptime:60
|
||||
a=sendrecv
|
||||
|
||||
|
||||
--- Packet 4 [14:24:30.479] ---
|
||||
Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162)
|
||||
ACK sip:192.168.0.162:5060 SIP/2.0
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e
|
||||
Max-Forwards: 70
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
CSeq: 12831 ACK
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
|
||||
--- Packet 5 [14:24:30.479] ---
|
||||
Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162)
|
||||
UPDATE sip:192.168.0.162:5060 SIP/2.0
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3
|
||||
Max-Forwards: 70
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
Contact: <sip:1001@192.168.0.164:51416;ob>
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
CSeq: 12832 UPDATE
|
||||
Supported: replaces, 100rel, timer, norefersub
|
||||
Session-Expires: 1800;refresher=uac
|
||||
Min-SE: 90
|
||||
Content-Type: application/sdp
|
||||
Content-Length: 318
|
||||
|
||||
v=0
|
||||
o=- 3977821470 3977821471 IN IP4 192.168.0.164
|
||||
s=pjmedia
|
||||
b=AS:84
|
||||
t=0 0
|
||||
a=X-nat:0
|
||||
m=audio 4040 RTP/AVP 0 101
|
||||
c=IN IP4 192.168.0.164
|
||||
b=TIAS:64000
|
||||
a=rtcp:4041 IN IP4 192.168.0.164
|
||||
a=ssrc:825569477 cname:1f442b6f1a4c18c5
|
||||
a=rtpmap:0 PCMU/8000
|
||||
a=rtpmap:101 telephone-event/8000
|
||||
a=fmtp:101 0-16
|
||||
a=sendrecv
|
||||
|
||||
|
||||
--- Packet 6 [14:24:30.480] ---
|
||||
Asterisk (PBX) (192.168.0.162) -> Windows (Carrier) (192.168.0.164)
|
||||
SIP/2.0 200 OK
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
CSeq: 12832 UPDATE
|
||||
Session-Expires: 1800;refresher=uac
|
||||
Require: timer
|
||||
Contact: <sip:192.168.0.162:5060>
|
||||
Allow: OPTIONS, REGISTER, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, MESSAGE, REFER
|
||||
Supported: 100rel, timer, replaces, norefersub
|
||||
Server: Asterisk PBX 18.10.0~dfsg+~cs6.10.40431411-2
|
||||
Content-Type: application/sdp
|
||||
Content-Length: 239
|
||||
|
||||
v=0
|
||||
o=- 3977821470 3977821473 IN IP4 192.168.0.162
|
||||
s=Asterisk
|
||||
c=IN IP4 192.168.0.162
|
||||
t=0 0
|
||||
m=audio 12862 RTP/AVP 0 101
|
||||
a=rtpmap:0 PCMU/8000
|
||||
a=rtpmap:101 telephone-event/8000
|
||||
a=fmtp:101 0-16
|
||||
a=ptime:20
|
||||
a=maxptime:150
|
||||
a=sendrecv
|
||||
|
||||
|
||||
--- Packet 7 [14:24:33.296] ---
|
||||
Windows (Carrier) (192.168.0.164) -> Asterisk (PBX) (192.168.0.162)
|
||||
BYE sip:192.168.0.162:5060 SIP/2.0
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201
|
||||
Max-Forwards: 70
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
CSeq: 12833 BYE
|
||||
User-Agent: MicroSIP/3.21.6
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
|
||||
--- Packet 8 [14:24:33.296] ---
|
||||
Asterisk (PBX) (192.168.0.162) -> Windows (Carrier) (192.168.0.164)
|
||||
SIP/2.0 200 OK
|
||||
Via: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201
|
||||
Call-ID: e06cb346194a4f9295d3a325b185912f
|
||||
From: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8fa1ce009ae2c095
|
||||
To: <sip:123456@192.168.0.162>;tag=643ebe4c-3476-4110-98e6-1b14f62996e1
|
||||
CSeq: 12833 BYE
|
||||
Server: Asterisk PBX 18.10.0~dfsg+~cs6.10.40431411-2
|
||||
Content-Length: 0
|
||||
|
||||
|
||||
BIN
inspector.exe
BIN
inspector.exe
Binary file not shown.
@@ -4,8 +4,10 @@ import (
|
||||
"bufio"
|
||||
"fmt"
|
||||
"io"
|
||||
"strconv"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"telephony-inspector/internal/sip"
|
||||
internalSSH "telephony-inspector/internal/ssh"
|
||||
@@ -17,6 +19,7 @@ type Capturer struct {
|
||||
cleanup func() error
|
||||
running bool
|
||||
mu sync.Mutex
|
||||
currentNetInfo *NetInfo
|
||||
|
||||
// Callbacks
|
||||
OnPacket func(*sip.Packet)
|
||||
@@ -55,7 +58,8 @@ func (c *Capturer) Start(iface string, port int) error {
|
||||
// -l: line buffered for real-time output
|
||||
// -A: print packet payload in ASCII
|
||||
// -s 0: capture full packets
|
||||
cmd := fmt.Sprintf("sudo tcpdump -l -A -s 0 -i %s port %d 2>/dev/null", iface, port)
|
||||
// -nn: don't resolve hostnames or port names
|
||||
cmd := fmt.Sprintf("sudo tcpdump -l -nn -A -s 0 -i %s port %d 2>/dev/null", iface, port)
|
||||
|
||||
stdout, stderr, cleanup, err := c.sshClient.StartCommand(cmd)
|
||||
if err != nil {
|
||||
@@ -100,8 +104,15 @@ func (c *Capturer) IsRunning() bool {
|
||||
|
||||
func (c *Capturer) processStream(r io.Reader) {
|
||||
scanner := bufio.NewScanner(r)
|
||||
// Increase buffer size to handle large packets
|
||||
const maxCapacity = 5 * 1024 * 1024 // 5MB
|
||||
buf := make([]byte, 0, 64*1024)
|
||||
scanner.Buffer(buf, maxCapacity)
|
||||
|
||||
var buffer strings.Builder
|
||||
inSIPMessage := false
|
||||
var msgNetInfo *NetInfo
|
||||
contentLength := -1
|
||||
|
||||
for scanner.Scan() {
|
||||
c.mu.Lock()
|
||||
@@ -113,28 +124,77 @@ func (c *Capturer) processStream(r io.Reader) {
|
||||
|
||||
line := scanner.Text()
|
||||
|
||||
// Check for tcpdump header
|
||||
if netInfo := parseTcpdumpHeader(line); netInfo != nil {
|
||||
c.currentNetInfo = netInfo
|
||||
continue
|
||||
}
|
||||
|
||||
// Detect start of SIP message
|
||||
if isSIPStart(line) {
|
||||
// If we were building a message, parse it
|
||||
if idx := findSIPStart(line); idx != -1 {
|
||||
|
||||
// Clean the line (remove prefix garbage)
|
||||
line = line[idx:]
|
||||
|
||||
// If we were building a message, parse it with its OWN net info
|
||||
if buffer.Len() > 0 {
|
||||
c.parseAndEmit(buffer.String())
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
buffer.Reset()
|
||||
}
|
||||
|
||||
// NOW update msgNetInfo for the new message
|
||||
if c.currentNetInfo != nil {
|
||||
info := *c.currentNetInfo
|
||||
msgNetInfo = &info
|
||||
} else {
|
||||
msgNetInfo = nil
|
||||
}
|
||||
|
||||
inSIPMessage = true
|
||||
contentLength = -1 // Reset
|
||||
}
|
||||
|
||||
if inSIPMessage {
|
||||
buffer.WriteString(line)
|
||||
buffer.WriteString("\r\n")
|
||||
|
||||
// Detect end of SIP message (double CRLF or content complete)
|
||||
// This is simplified - real implementation would track Content-Length
|
||||
// Check for Content-Length
|
||||
lowerLine := strings.ToLower(line)
|
||||
if strings.HasPrefix(lowerLine, "content-length:") || strings.HasPrefix(lowerLine, "l:") {
|
||||
parts := strings.Split(line, ":")
|
||||
if len(parts) >= 2 {
|
||||
val := strings.TrimSpace(parts[1])
|
||||
if val != "" {
|
||||
if cl, err := strconv.Atoi(val); err == nil {
|
||||
contentLength = cl
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Check for end of headers (empty line)
|
||||
if line == "" {
|
||||
// If Content-Length is 0 (or not found, treating as 0)
|
||||
// Flush immediately
|
||||
if contentLength <= 0 {
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
buffer.Reset()
|
||||
inSIPMessage = false
|
||||
contentLength = -1
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Parse remaining buffer
|
||||
if buffer.Len() > 0 {
|
||||
c.parseAndEmit(buffer.String())
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
}
|
||||
|
||||
if err := scanner.Err(); err != nil {
|
||||
if c.OnError != nil {
|
||||
c.OnError(fmt.Errorf("scanner error: %w", err))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -147,7 +207,7 @@ func (c *Capturer) processErrors(r io.Reader) {
|
||||
}
|
||||
}
|
||||
|
||||
func (c *Capturer) parseAndEmit(raw string) {
|
||||
func (c *Capturer) parseAndEmit(raw string, netInfo *NetInfo) {
|
||||
packet, err := sip.Parse(raw)
|
||||
if err != nil {
|
||||
if c.OnError != nil {
|
||||
@@ -155,26 +215,140 @@ func (c *Capturer) parseAndEmit(raw string) {
|
||||
}
|
||||
return
|
||||
}
|
||||
if packet != nil && c.OnPacket != nil {
|
||||
if packet != nil {
|
||||
// Attach network info if available
|
||||
if netInfo != nil {
|
||||
packet.Timestamp = netInfo.Timestamp
|
||||
packet.SourceIP = netInfo.SourceIP
|
||||
packet.SourcePort = netInfo.SourcePort
|
||||
packet.DestIP = netInfo.DestIP
|
||||
packet.DestPort = netInfo.DestPort
|
||||
}
|
||||
|
||||
if c.OnPacket != nil {
|
||||
c.OnPacket(packet)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// isSIPStart checks if a line looks like the start of a SIP message
|
||||
func isSIPStart(line string) bool {
|
||||
// findSIPStart returns the index of the start of a SIP message, or -1 if not found
|
||||
func findSIPStart(line string) int {
|
||||
sipMethods := []string{"INVITE", "ACK", "BYE", "CANCEL", "REGISTER", "OPTIONS", "PRACK", "SUBSCRIBE", "NOTIFY", "PUBLISH", "INFO", "REFER", "MESSAGE", "UPDATE"}
|
||||
|
||||
// Response
|
||||
if strings.HasPrefix(line, "SIP/2.0") {
|
||||
return true
|
||||
// Check for Response "SIP/2.0"
|
||||
if idx := strings.Index(line, "SIP/2.0 "); idx != -1 {
|
||||
// Verify it's not part of a header like Via or Record-Route
|
||||
// We look at what comes before. If it's the start of the line or preceded by garbage (nulls etc), it's likely a start.
|
||||
// If it is preceded by "Via: " or "Route: ", it is a header.
|
||||
prefix := strings.ToUpper(line[:idx])
|
||||
if !strings.HasSuffix(prefix, "VIA: ") &&
|
||||
!strings.HasSuffix(prefix, "ROUTE: ") &&
|
||||
!strings.HasSuffix(prefix, "VIA:") { // Handle varying spacing
|
||||
return idx
|
||||
}
|
||||
}
|
||||
|
||||
// Request
|
||||
// Check for Request "METHOD "
|
||||
for _, m := range sipMethods {
|
||||
if strings.HasPrefix(line, m+" ") {
|
||||
return true
|
||||
target := m + " "
|
||||
if idx := strings.Index(line, target); idx != -1 {
|
||||
// Verify it's not CSeq, Allow, Rack, etc.
|
||||
prefix := strings.ToUpper(line[:idx])
|
||||
if !strings.HasSuffix(prefix, "CSEQ: ") &&
|
||||
!strings.HasSuffix(prefix, "ALLOW: ") &&
|
||||
!strings.HasSuffix(prefix, "RACK: ") &&
|
||||
!strings.HasSuffix(prefix, "SUPPORTED: ") {
|
||||
return idx
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return false
|
||||
return -1
|
||||
}
|
||||
|
||||
// NetInfo stores network layer information from tcpdump headers
|
||||
type NetInfo struct {
|
||||
Timestamp time.Time
|
||||
SourceIP string
|
||||
SourcePort int
|
||||
DestIP string
|
||||
DestPort int
|
||||
}
|
||||
|
||||
func parseTcpdumpHeader(line string) *NetInfo {
|
||||
// Robust parsing
|
||||
// Look for " IP " or " IP6 "
|
||||
parts := strings.Fields(line)
|
||||
// Need at least: Time IP Src > Dst:
|
||||
if len(parts) < 5 {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Find the direction arrow ">"
|
||||
arrowIdx := -1
|
||||
for i, p := range parts {
|
||||
if p == ">" {
|
||||
arrowIdx = i
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if arrowIdx == -1 || arrowIdx < 2 {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Verify "IP" or "IP6" exists before the source (usually parts[1] or parts[2])
|
||||
// Example: 15:35... IP src > dst: ...
|
||||
// Example: 15:35... IP6 src > dst: ...
|
||||
// Example (verbose): 15:35... IP (tos 0x0...) src > dst: ...
|
||||
// We'll trust the arrow for now, but double check IPs.
|
||||
|
||||
// Assume SRC is before arrow, DST is after
|
||||
srcStr := parts[arrowIdx-1]
|
||||
dstStr := parts[arrowIdx+1]
|
||||
|
||||
// Find timestamp (usually first field)
|
||||
now := time.Now()
|
||||
t, err := time.Parse("15:04:05.000000", parts[0])
|
||||
if err == nil {
|
||||
t = time.Date(now.Year(), now.Month(), now.Day(), t.Hour(), t.Minute(), t.Second(), t.Nanosecond(), now.Location())
|
||||
} else {
|
||||
// Try without microseconds
|
||||
t, err = time.Parse("15:04:05", parts[0])
|
||||
if err == nil {
|
||||
t = time.Date(now.Year(), now.Month(), now.Day(), t.Hour(), t.Minute(), t.Second(), 0, now.Location())
|
||||
} else {
|
||||
t = now
|
||||
}
|
||||
}
|
||||
|
||||
// Helper to extract IP and Port
|
||||
parseIPPort := func(s string) (string, int) {
|
||||
lastDot := strings.LastIndex(s, ".")
|
||||
if lastDot == -1 {
|
||||
// IPv6 might use different separation or just be IP
|
||||
return s, 0
|
||||
}
|
||||
ip := s[:lastDot]
|
||||
portStr := s[lastDot+1:]
|
||||
// Remove trailing colon if present (dest)
|
||||
portStr = strings.TrimSuffix(portStr, ":")
|
||||
// Remove trailing comma if present
|
||||
portStr = strings.TrimSuffix(portStr, ",")
|
||||
|
||||
var port int
|
||||
fmt.Sscanf(portStr, "%d", &port)
|
||||
return ip, port
|
||||
}
|
||||
|
||||
srcIP, srcPort := parseIPPort(srcStr)
|
||||
dstIP, dstPort := parseIPPort(dstStr)
|
||||
|
||||
return &NetInfo{
|
||||
Timestamp: t,
|
||||
SourceIP: srcIP,
|
||||
SourcePort: srcPort,
|
||||
DestIP: dstIP,
|
||||
DestPort: dstPort,
|
||||
}
|
||||
}
|
||||
|
||||
@@ -6,9 +6,11 @@ import (
|
||||
"fmt"
|
||||
"io"
|
||||
"os/exec"
|
||||
"strconv"
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"telephony-inspector/internal/logger"
|
||||
"telephony-inspector/internal/sip"
|
||||
)
|
||||
|
||||
@@ -18,6 +20,7 @@ type LocalCapturer struct {
|
||||
cancel context.CancelFunc
|
||||
running bool
|
||||
mu sync.Mutex
|
||||
currentNetInfo *NetInfo
|
||||
|
||||
// Callbacks
|
||||
OnPacket func(*sip.Packet)
|
||||
@@ -46,9 +49,12 @@ func (c *LocalCapturer) Start(iface string, port int) error {
|
||||
// -l: line buffered
|
||||
// -A: print packet payload in ASCII
|
||||
// -s 0: capture full packets
|
||||
args := []string{"-l", "-A", "-s", "0", "-i", iface, "port", fmt.Sprintf("%d", port)}
|
||||
// -nn: don't resolve hostnames or port names
|
||||
args := []string{"-l", "-nn", "-A", "-s", "0", "-i", iface, "port", fmt.Sprintf("%d", port)}
|
||||
c.cmd = exec.CommandContext(ctx, "tcpdump", args...)
|
||||
|
||||
logger.Info("Starting local capture: tcpdump %v", args)
|
||||
|
||||
stdout, err := c.cmd.StdoutPipe()
|
||||
if err != nil {
|
||||
c.mu.Lock()
|
||||
@@ -72,6 +78,8 @@ func (c *LocalCapturer) Start(iface string, port int) error {
|
||||
return fmt.Errorf("failed to start tcpdump: %w", err)
|
||||
}
|
||||
|
||||
logger.Info("Local capture started successfully")
|
||||
|
||||
// Process stdout in goroutine
|
||||
go c.processStream(stdout)
|
||||
|
||||
@@ -89,6 +97,7 @@ func (c *LocalCapturer) Stop() {
|
||||
if !c.running {
|
||||
return
|
||||
}
|
||||
logger.Info("Stopping local capture")
|
||||
c.running = false
|
||||
|
||||
if c.cancel != nil {
|
||||
@@ -117,8 +126,15 @@ func (c *LocalCapturer) Close() error {
|
||||
|
||||
func (c *LocalCapturer) processStream(r io.Reader) {
|
||||
scanner := bufio.NewScanner(r)
|
||||
// Increase buffer size to handle large packets (default is 64KB)
|
||||
const maxCapacity = 5 * 1024 * 1024 // 5MB
|
||||
buf := make([]byte, 0, 64*1024)
|
||||
scanner.Buffer(buf, maxCapacity)
|
||||
|
||||
var buffer strings.Builder
|
||||
inSIPMessage := false
|
||||
var msgNetInfo *NetInfo
|
||||
contentLength := -1
|
||||
|
||||
for scanner.Scan() {
|
||||
c.mu.Lock()
|
||||
@@ -130,25 +146,99 @@ func (c *LocalCapturer) processStream(r io.Reader) {
|
||||
|
||||
line := scanner.Text()
|
||||
|
||||
// Check for tcpdump header
|
||||
if netInfo := parseTcpdumpHeader(line); netInfo != nil {
|
||||
c.currentNetInfo = netInfo
|
||||
continue
|
||||
}
|
||||
|
||||
// Detect start of SIP message
|
||||
if isSIPStart(line) {
|
||||
// If we were building a message, parse it
|
||||
if idx := findSIPStart(line); idx != -1 {
|
||||
logger.Debug("SIP Start detected: %s", line)
|
||||
|
||||
// Clean the line (remove prefix garbage)
|
||||
line = line[idx:]
|
||||
|
||||
// If we were building a message, parse it with its OWN net info (which was latched previously)
|
||||
// Note: This edge case (buffer > 0 but new start) means previous message ended implicitly.
|
||||
// But wait, the msgNetInfo we just latched is for the NEW message.
|
||||
// The OLD message should have already been emitted or we are in a weird state.
|
||||
// Use the PREVIOUS msgNetInfo for the existing buffer if any.
|
||||
// Actually, single buffer logic is simple: emit what we have.
|
||||
if buffer.Len() > 0 {
|
||||
c.parseAndEmit(buffer.String())
|
||||
// We need to pass the net info that belongs to the buffered content.
|
||||
// But we just overwrote msgNetInfo.
|
||||
// Realistically, we should emit before latching new info.
|
||||
// But tcpdump header comes BEFORE the message.
|
||||
// So c.currentNetInfo is already the NEW info.
|
||||
// And the buffer contains the OLD message.
|
||||
// So when we started the OLD message, we latched OLD info.
|
||||
// We should persist that OLD info until emit.
|
||||
// This implies we need `pendingNetInfo` vs `currentNetInfo`.
|
||||
|
||||
// Simplified approach: msgNetInfo stores the info for the message currently being built in buffer.
|
||||
// When we start a NEW message, the buffer contains the PREVIOUS message.
|
||||
// So we emit the buffer with the OLD msgNetInfo.
|
||||
// THEN we start the new message and update msgNetInfo to the NEW c.currentNetInfo.
|
||||
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
buffer.Reset()
|
||||
}
|
||||
|
||||
// NOW update msgNetInfo for the new message
|
||||
if c.currentNetInfo != nil {
|
||||
info := *c.currentNetInfo
|
||||
msgNetInfo = &info
|
||||
} else {
|
||||
msgNetInfo = nil
|
||||
}
|
||||
|
||||
inSIPMessage = true
|
||||
contentLength = -1 // Reset for new message
|
||||
}
|
||||
|
||||
if inSIPMessage {
|
||||
buffer.WriteString(line)
|
||||
buffer.WriteString("\r\n")
|
||||
|
||||
// Check for Content-Length
|
||||
lowerLine := strings.ToLower(line)
|
||||
if strings.HasPrefix(lowerLine, "content-length:") || strings.HasPrefix(lowerLine, "l:") {
|
||||
parts := strings.Split(line, ":")
|
||||
if len(parts) >= 2 {
|
||||
val := strings.TrimSpace(parts[1])
|
||||
if val != "" {
|
||||
if cl, err := strconv.Atoi(val); err == nil {
|
||||
contentLength = cl
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Check for end of headers (empty line)
|
||||
if line == "" {
|
||||
// If Content-Length is 0 (or not found, treating as 0 for safety in this context usually 0 for BYE/ACK)
|
||||
// Flush immediately
|
||||
if contentLength <= 0 {
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
buffer.Reset()
|
||||
inSIPMessage = false
|
||||
contentLength = -1
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Parse remaining buffer
|
||||
if buffer.Len() > 0 {
|
||||
c.parseAndEmit(buffer.String())
|
||||
c.parseAndEmit(buffer.String(), msgNetInfo)
|
||||
}
|
||||
|
||||
if err := scanner.Err(); err != nil {
|
||||
logger.Error("Scanner error: %v", err)
|
||||
if c.OnError != nil {
|
||||
c.OnError(fmt.Errorf("scanner error: %w", err))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -158,23 +248,38 @@ func (c *LocalCapturer) processErrors(r io.Reader) {
|
||||
text := scanner.Text()
|
||||
// tcpdump prints "listening on..." to stderr, ignore it
|
||||
if strings.Contains(text, "listening on") {
|
||||
logger.Info("tcpdump: %s", text)
|
||||
continue
|
||||
}
|
||||
logger.Error("tcpdump stderr: %s", text)
|
||||
if c.OnError != nil {
|
||||
c.OnError(fmt.Errorf("tcpdump: %s", text))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (c *LocalCapturer) parseAndEmit(raw string) {
|
||||
func (c *LocalCapturer) parseAndEmit(raw string, netInfo *NetInfo) {
|
||||
packet, err := sip.Parse(raw)
|
||||
if err != nil {
|
||||
// Suppress verbose error logging for partial packets unless debug
|
||||
// logger.Error("Error parsing SIP packet: %v", err)
|
||||
if c.OnError != nil {
|
||||
c.OnError(err)
|
||||
}
|
||||
return
|
||||
}
|
||||
if packet != nil && c.OnPacket != nil {
|
||||
if packet != nil {
|
||||
// Attach network info if available
|
||||
if netInfo != nil {
|
||||
packet.Timestamp = netInfo.Timestamp
|
||||
packet.SourceIP = netInfo.SourceIP
|
||||
packet.SourcePort = netInfo.SourcePort
|
||||
packet.DestIP = netInfo.DestIP
|
||||
packet.DestPort = netInfo.DestPort
|
||||
}
|
||||
logger.Debug("Packet parsed: %s %s -> %s", packet.Method, packet.SourceIP, packet.DestIP)
|
||||
if c.OnPacket != nil {
|
||||
c.OnPacket(packet)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,5 +1,7 @@
|
||||
package config
|
||||
|
||||
import "fmt"
|
||||
|
||||
// NodeType represents the type of network node
|
||||
type NodeType string
|
||||
|
||||
@@ -56,7 +58,7 @@ func (nm *NetworkMap) FindByIP(ip string) *NetworkNode {
|
||||
// LabelForIP returns a human-readable label for an IP, or the IP itself if unknown
|
||||
func (nm *NetworkMap) LabelForIP(ip string) string {
|
||||
if node := nm.FindByIP(ip); node != nil {
|
||||
return node.Name + " (" + string(node.Type) + ")"
|
||||
return fmt.Sprintf("%s (%s)", node.Name, node.Type)
|
||||
}
|
||||
return ip
|
||||
}
|
||||
|
||||
@@ -52,11 +52,18 @@ func (s *CallFlowStore) AddPacket(p *Packet) *CallFlow {
|
||||
}
|
||||
|
||||
flow, exists := s.flows[p.CallID]
|
||||
|
||||
// Determine timestamp to use
|
||||
ts := p.Timestamp
|
||||
if ts.IsZero() {
|
||||
ts = time.Now()
|
||||
}
|
||||
|
||||
if !exists {
|
||||
flow = &CallFlow{
|
||||
CallID: p.CallID,
|
||||
Packets: make([]*Packet, 0),
|
||||
StartTime: time.Now(),
|
||||
StartTime: ts,
|
||||
From: p.From,
|
||||
To: p.To,
|
||||
State: CallStateInitial,
|
||||
@@ -65,7 +72,10 @@ func (s *CallFlowStore) AddPacket(p *Packet) *CallFlow {
|
||||
}
|
||||
|
||||
flow.Packets = append(flow.Packets, p)
|
||||
flow.EndTime = time.Now()
|
||||
// Always update EndTime to the latest packet's timestamp
|
||||
if ts.After(flow.EndTime) {
|
||||
flow.EndTime = ts
|
||||
}
|
||||
|
||||
// Update call state based on packet
|
||||
s.updateState(flow, p)
|
||||
@@ -143,6 +153,27 @@ func (s *CallFlowStore) GetRecentFlows(n int) []*CallFlow {
|
||||
return flows
|
||||
}
|
||||
|
||||
// GetSortedFlows returns all call flows sorted by StartTime (oldest first)
|
||||
func (s *CallFlowStore) GetSortedFlows() []*CallFlow {
|
||||
flows := s.GetAllFlows()
|
||||
|
||||
// Sort by start time ascending (oldest first), then by CallID for stable order
|
||||
for i := 0; i < len(flows)-1; i++ {
|
||||
for j := i + 1; j < len(flows); j++ {
|
||||
// Compare by StartTime first
|
||||
if flows[i].StartTime.After(flows[j].StartTime) {
|
||||
flows[i], flows[j] = flows[j], flows[i]
|
||||
} else if flows[i].StartTime.Equal(flows[j].StartTime) {
|
||||
// If same time, sort by CallID for stable order
|
||||
if flows[i].CallID > flows[j].CallID {
|
||||
flows[i], flows[j] = flows[j], flows[i]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return flows
|
||||
}
|
||||
|
||||
// Count returns the number of call flows
|
||||
func (s *CallFlowStore) Count() int {
|
||||
s.mu.RLock()
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -1,52 +0,0 @@
|
||||
[14:18:33.982] [INFO] Logger initialized: logs\2026-01-19_14-18-33.log
|
||||
[14:18:33.986] [INFO] Starting Telephony Inspector
|
||||
[14:18:40.383] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\test2.pcap
|
||||
[14:18:40.387] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\test2.pcap
|
||||
[14:18:40.391] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:18:40.395] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:18:40.399] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00022a150 0xc00034a000 0xc000234100 0xc000232090]
|
||||
[14:18:40.402] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:18:40.407] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060
|
||||
[14:18:40.409] [DEBUG] PcapReader: Packet 1 application layer, payload length: 528
|
||||
[14:18:40.411] [DEBUG] PcapReader: Packet 1 payload preview: "v=0\r\no=- 3977820639 3977820639 IN IP4 192.168.0.164\r\ns=pjmedia\r\nb=AS:84\r\nt=0 0\r\na=X-nat:0\r\nm=audio 4"
|
||||
[14:18:40.413] [DEBUG] PcapReader: Packet 1 is not SIP
|
||||
[14:18:40.415] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00022a1c0 0xc00034a0a0 0xc000234180 0xc000232120]
|
||||
[14:18:40.417] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:18:40.419] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416
|
||||
[14:18:40.421] [DEBUG] PcapReader: Packet 2 application layer, payload length: 0
|
||||
[14:18:40.423] [DEBUG] PcapReader: Packet 2 is not SIP
|
||||
[14:18:40.425] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00022a230 0xc00034a140 0xc000234200 0xc0002321b0]
|
||||
[14:18:40.426] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:18:40.428] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416
|
||||
[14:18:40.431] [DEBUG] PcapReader: Packet 3 application layer, payload length: 375
|
||||
[14:18:40.433] [DEBUG] PcapReader: Packet 3 payload preview: "v=0\r\no=- 3977820639 3977820641 IN IP4 192.168.0.162\r\ns=Asterisk\r\nc=IN IP4 192.168.0.162\r\nt=0 0\r\nm=au"
|
||||
[14:18:40.434] [DEBUG] PcapReader: Packet 3 is not SIP
|
||||
[14:18:40.436] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00022a2a0 0xc00034a1e0 0xc000234280 0xc000232240]
|
||||
[14:18:40.439] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:18:40.441] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060
|
||||
[14:18:40.443] [DEBUG] PcapReader: Packet 4 application layer, payload length: 0
|
||||
[14:18:40.444] [DEBUG] PcapReader: Packet 4 is not SIP
|
||||
[14:18:40.446] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00022a310 0xc00034a280 0xc000234300 0xc0002322d0]
|
||||
[14:18:40.448] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:18:40.450] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060
|
||||
[14:18:40.451] [DEBUG] PcapReader: Packet 5 application layer, payload length: 319
|
||||
[14:18:40.454] [DEBUG] PcapReader: Packet 5 payload preview: "v=0\r\no=- 3977820639 3977820640 IN IP4 192.168.0.164\r\ns=pjmedia\r\nb=AS:84\r\nt=0 0\r\na=X-nat:0\r\nm=audio 4"
|
||||
[14:18:40.456] [DEBUG] PcapReader: Packet 5 is not SIP
|
||||
[14:18:40.457] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00022a380 0xc00034a320 0xc000234380 0xc000232360]
|
||||
[14:18:40.459] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:18:40.461] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416
|
||||
[14:18:40.462] [DEBUG] PcapReader: Packet 6 application layer, payload length: 239
|
||||
[14:18:40.465] [DEBUG] PcapReader: Packet 6 payload preview: "v=0\r\no=- 3977820639 3977820642 IN IP4 192.168.0.162\r\ns=Asterisk\r\nc=IN IP4 192.168.0.162\r\nt=0 0\r\nm=au"
|
||||
[14:18:40.467] [DEBUG] PcapReader: Packet 6 is not SIP
|
||||
[14:18:40.468] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00022a3f0 0xc00034a3c0 0xc000234400 0xc0002323f0]
|
||||
[14:18:40.470] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:18:40.472] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060
|
||||
[14:18:40.474] [DEBUG] PcapReader: Packet 7 application layer, payload length: 0
|
||||
[14:18:40.476] [DEBUG] PcapReader: Packet 7 is not SIP
|
||||
[14:18:40.478] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00022a460 0xc00034a460 0xc000234480 0xc000232480]
|
||||
[14:18:40.480] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:18:40.481] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416
|
||||
[14:18:40.483] [DEBUG] PcapReader: Packet 8 application layer, payload length: 0
|
||||
[14:18:40.485] [DEBUG] PcapReader: Packet 8 is not SIP
|
||||
[14:18:40.487] [INFO] PcapReader: Finished reading. Total packets: 8, SIP packets: 0
|
||||
[14:23:18.995] [INFO] Telephony Inspector exited normally
|
||||
@@ -1,237 +0,0 @@
|
||||
[14:23:22.124] [INFO] Logger initialized: logs\2026-01-19_14-23-22.log
|
||||
[14:23:22.128] [INFO] Starting Telephony Inspector
|
||||
[14:23:26.188] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\test.pcapng
|
||||
[14:23:26.193] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\test.pcapng
|
||||
[14:23:26.197] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:23:26.200] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:23:26.204] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00048c0e0 0xc00049c000 0xc000332100 0xc00049e000]
|
||||
[14:23:26.208] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:23:26.212] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1154
|
||||
[14:23:26.214] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:145632@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094"
|
||||
[14:23:26.215] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:23:26.218] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||||
[14:23:26.220] [INFO] PcapReader: Found SIP packet 1: INVITE b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.221] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00048c150 0xc00049c0a0 0xc000332180 0xc00049e090]
|
||||
[14:23:26.223] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:23:26.225] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||||
[14:23:26.227] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001"
|
||||
[14:23:26.229] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:23:26.231] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||||
[14:23:26.233] [INFO] PcapReader: Found SIP packet 2: 100 b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.234] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00048c1c0 0xc00049c140 0xc000332200 0xc00049e120]
|
||||
[14:23:26.236] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:23:26.238] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||||
[14:23:26.240] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj2b9d528911164b1795466ba22bc7e1e0\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
|
||||
[14:23:26.242] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:23:26.244] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||||
[14:23:26.246] [INFO] PcapReader: Found SIP packet 3: 200 b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.248] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00048c230 0xc00049c1e0 0xc000332280 0xc00049e1b0]
|
||||
[14:23:26.249] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:23:26.251] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||||
[14:23:26.253] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj5a53b67ee71748bf944b029063d2d8b4\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
|
||||
[14:23:26.255] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:23:26.257] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||||
[14:23:26.259] [INFO] PcapReader: Found SIP packet 4: ACK b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.261] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00048c2a0 0xc00049c280 0xc000332300 0xc00049e240]
|
||||
[14:23:26.263] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:23:26.264] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 871
|
||||
[14:23:26.267] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3"
|
||||
[14:23:26.269] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:23:26.271] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||||
[14:23:26.273] [INFO] PcapReader: Found SIP packet 5: UPDATE b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.275] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00048c310 0xc00049c320 0xc000332380 0xc00049e2d0]
|
||||
[14:23:26.276] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:23:26.278] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||||
[14:23:26.280] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPje6cb582aed174802a817688d4d8b7f0d\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
|
||||
[14:23:26.282] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:23:26.284] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||||
[14:23:26.286] [INFO] PcapReader: Found SIP packet 6: 200 b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.288] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00048c380 0xc00049c3c0 0xc000332400 0xc00049e360]
|
||||
[14:23:26.289] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:23:26.291] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||||
[14:23:26.293] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d158c77860094c3dbd"
|
||||
[14:23:26.295] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:23:26.297] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||||
[14:23:26.299] [INFO] PcapReader: Found SIP packet 7: BYE b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.301] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00048c3f0 0xc00049c460 0xc000332480 0xc00049e3f0]
|
||||
[14:23:26.303] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:23:26.305] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||||
[14:23:26.306] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj8e548a072435464c8b97c3930df0cbca\r\nCall-ID: b8060bf9ee0d43cbb60d714e22046659\r\nFrom: <sip:1001@192"
|
||||
[14:23:26.308] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:23:26.310] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||||
[14:23:26.311] [INFO] PcapReader: Found SIP packet 8: 200 b8060bf9ee0d43cbb60d714e22046659
|
||||
[14:23:26.314] [INFO] PcapReader: Finished reading. Total packets: 8, SIP packets: 8
|
||||
[14:25:08.950] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:25:08.953] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:25:08.955] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:25:08.957] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:25:08.959] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0005320e0 0xc0001121e0 0xc000154080 0xc000232090]
|
||||
[14:25:08.961] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:08.963] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
|
||||
[14:25:08.965] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
|
||||
[14:25:08.967] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:08.969] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||||
[14:25:08.971] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:08.973] [DEBUG] PcapReader: Processing packet 2, layers: [0xc000532150 0xc000112460 0xc000154100 0xc000232120]
|
||||
[14:25:08.975] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:08.976] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||||
[14:25:08.978] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
|
||||
[14:25:08.980] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:08.981] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||||
[14:25:08.984] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:08.986] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0005321c0 0xc0001125a0 0xc000154180 0xc0002321b0]
|
||||
[14:25:08.988] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:08.990] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||||
[14:25:08.991] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:08.993] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:08.995] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||||
[14:25:08.997] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:08.998] [DEBUG] PcapReader: Processing packet 4, layers: [0xc000532230 0xc0001126e0 0xc000154200 0xc000232240]
|
||||
[14:25:09.001] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.006] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||||
[14:25:09.008] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:25:09.010] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:09.012] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||||
[14:25:09.014] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:09.016] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0005322a0 0xc000112780 0xc000154280 0xc0002322d0]
|
||||
[14:25:09.018] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.019] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
|
||||
[14:25:09.021] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
|
||||
[14:25:09.023] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:09.025] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||||
[14:25:09.027] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:09.029] [DEBUG] PcapReader: Processing packet 6, layers: [0xc000532310 0xc000112820 0xc000154300 0xc000232360]
|
||||
[14:25:09.031] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.032] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||||
[14:25:09.034] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.035] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.038] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||||
[14:25:09.040] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:09.041] [DEBUG] PcapReader: Processing packet 7, layers: [0xc000532380 0xc0001128c0 0xc000154380 0xc0002323f0]
|
||||
[14:25:09.043] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.045] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||||
[14:25:09.047] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:25:09.048] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:09.051] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||||
[14:25:09.052] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:09.054] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0005323f0 0xc000112960 0xc000154400 0xc000232480]
|
||||
[14:25:09.056] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.058] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||||
[14:25:09.059] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.061] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.064] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||||
[14:25:09.065] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:09.067] [DEBUG] PcapReader: Processing packet 9, layers: [0xc000532460 0xc000112a00 0xc000154480 0xc000232510]
|
||||
[14:25:09.069] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.071] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
|
||||
[14:25:09.073] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
|
||||
[14:25:09.074] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:09.076] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
|
||||
[14:25:09.078] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.080] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0005324d0 0xc000112aa0 0xc000154580 0xc0002325a0]
|
||||
[14:25:09.081] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.083] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
|
||||
[14:25:09.085] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
|
||||
[14:25:09.087] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.089] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
|
||||
[14:25:09.090] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.092] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000532540 0xc000112b40 0xc000154600 0xc000232630]
|
||||
[14:25:09.094] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.096] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
|
||||
[14:25:09.098] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.100] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.101] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
|
||||
[14:25:09.103] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.105] [DEBUG] PcapReader: Processing packet 12, layers: [0xc0005325b0 0xc000112be0 0xc000154680 0xc0002326c0]
|
||||
[14:25:09.107] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.108] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
|
||||
[14:25:09.110] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:25:09.112] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:09.114] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
|
||||
[14:25:09.116] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.118] [DEBUG] PcapReader: Processing packet 13, layers: [0xc000532620 0xc000112c80 0xc000154700 0xc000232750]
|
||||
[14:25:09.120] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.121] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
|
||||
[14:25:09.123] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
|
||||
[14:25:09.125] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:09.127] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
|
||||
[14:25:09.129] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.131] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000532690 0xc000112d20 0xc000154780 0xc0002327e0]
|
||||
[14:25:09.132] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.134] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
|
||||
[14:25:09.136] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.138] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.139] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
|
||||
[14:25:09.141] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.143] [DEBUG] PcapReader: Processing packet 15, layers: [0xc000532700 0xc000112dc0 0xc000154800 0xc000232870]
|
||||
[14:25:09.145] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.147] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
|
||||
[14:25:09.148] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:25:09.150] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:09.152] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
|
||||
[14:25:09.154] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.156] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000532770 0xc000112e60 0xc000154880 0xc000232900]
|
||||
[14:25:09.157] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.159] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
|
||||
[14:25:09.162] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.163] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.165] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
|
||||
[14:25:09.167] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:09.169] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0005327e0 0xc000112f00 0xc000154900 0xc000232990]
|
||||
[14:25:09.171] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.173] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
|
||||
[14:25:09.175] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:25:09.176] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:09.178] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
|
||||
[14:25:09.180] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.181] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000532850 0xc000112fa0 0xc000154980 0xc000232a20]
|
||||
[14:25:09.184] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.186] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
|
||||
[14:25:09.187] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
|
||||
[14:25:09.189] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.191] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
|
||||
[14:25:09.193] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.195] [DEBUG] PcapReader: Processing packet 19, layers: [0xc0005328c0 0xc000113040 0xc000154a00 0xc000232ab0]
|
||||
[14:25:09.197] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.198] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
|
||||
[14:25:09.201] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.202] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.204] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
|
||||
[14:25:09.206] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.208] [DEBUG] PcapReader: Processing packet 20, layers: [0xc000532930 0xc0001130e0 0xc000154a80 0xc000232b40]
|
||||
[14:25:09.209] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.212] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
|
||||
[14:25:09.213] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:25:09.215] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:09.217] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
|
||||
[14:25:09.219] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.221] [DEBUG] PcapReader: Processing packet 21, layers: [0xc0005329a0 0xc000113180 0xc000154b00 0xc000232bd0]
|
||||
[14:25:09.223] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.224] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
|
||||
[14:25:09.226] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:25:09.228] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:09.230] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
|
||||
[14:25:09.231] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.233] [DEBUG] PcapReader: Processing packet 22, layers: [0xc000532a10 0xc000113220 0xc000154b80 0xc000232c60]
|
||||
[14:25:09.235] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.237] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
|
||||
[14:25:09.239] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.241] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.242] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
|
||||
[14:25:09.245] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.246] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000532a80 0xc0001132c0 0xc000154c00 0xc000232cf0]
|
||||
[14:25:09.248] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:09.250] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
|
||||
[14:25:09.252] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:25:09.253] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:09.255] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
|
||||
[14:25:09.257] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.259] [DEBUG] PcapReader: Processing packet 24, layers: [0xc000532af0 0xc000113360 0xc000154c80 0xc000232d80]
|
||||
[14:25:09.261] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:09.263] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
|
||||
[14:25:09.264] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:09.266] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:09.268] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
|
||||
[14:25:09.270] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:09.271] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
|
||||
[14:25:29.806] [INFO] Telephony Inspector exited normally
|
||||
@@ -1,176 +0,0 @@
|
||||
[14:25:30.903] [INFO] Logger initialized: logs\2026-01-19_14-25-30.log
|
||||
[14:25:30.906] [INFO] Starting Telephony Inspector
|
||||
[14:25:35.313] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:25:35.317] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:25:35.320] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:25:35.324] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:25:35.327] [DEBUG] PcapReader: Processing packet 1, layers: [0xc00043a230 0xc00044e000 0xc00031a280 0xc000450000]
|
||||
[14:25:35.331] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.335] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
|
||||
[14:25:35.337] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
|
||||
[14:25:35.338] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:35.340] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||||
[14:25:35.342] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.344] [DEBUG] PcapReader: Processing packet 2, layers: [0xc00043a2a0 0xc00044e0a0 0xc00031a300 0xc000450090]
|
||||
[14:25:35.346] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.348] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||||
[14:25:35.350] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
|
||||
[14:25:35.351] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.353] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||||
[14:25:35.355] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.357] [DEBUG] PcapReader: Processing packet 3, layers: [0xc00043a310 0xc00044e140 0xc00031a380 0xc000450120]
|
||||
[14:25:35.359] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.361] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||||
[14:25:35.363] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.365] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.366] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||||
[14:25:35.368] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.370] [DEBUG] PcapReader: Processing packet 4, layers: [0xc00043a380 0xc00044e1e0 0xc00031a400 0xc0004501b0]
|
||||
[14:25:35.372] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.374] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||||
[14:25:35.376] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:25:35.378] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:35.379] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||||
[14:25:35.381] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.383] [DEBUG] PcapReader: Processing packet 5, layers: [0xc00043a3f0 0xc00044e280 0xc00031a480 0xc000450240]
|
||||
[14:25:35.385] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.387] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
|
||||
[14:25:35.389] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
|
||||
[14:25:35.390] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:35.392] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||||
[14:25:35.394] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.396] [DEBUG] PcapReader: Processing packet 6, layers: [0xc00043a460 0xc00044e320 0xc00031a500 0xc0004502d0]
|
||||
[14:25:35.398] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.399] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||||
[14:25:35.401] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.403] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.405] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||||
[14:25:35.406] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.408] [DEBUG] PcapReader: Processing packet 7, layers: [0xc00043a4d0 0xc00044e3c0 0xc00031a580 0xc000450360]
|
||||
[14:25:35.410] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.412] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||||
[14:25:35.414] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:25:35.415] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:35.417] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||||
[14:25:35.419] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.421] [DEBUG] PcapReader: Processing packet 8, layers: [0xc00043a540 0xc00044e460 0xc00031a600 0xc0004503f0]
|
||||
[14:25:35.439] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.440] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||||
[14:25:35.442] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.444] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.446] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||||
[14:25:35.448] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:25:35.450] [DEBUG] PcapReader: Processing packet 9, layers: [0xc00043a5b0 0xc00044e500 0xc00031a680 0xc000450480]
|
||||
[14:25:35.451] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.453] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
|
||||
[14:25:35.454] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
|
||||
[14:25:35.457] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:35.459] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
|
||||
[14:25:35.461] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.462] [DEBUG] PcapReader: Processing packet 10, layers: [0xc00043a620 0xc00044e5a0 0xc00031a700 0xc000450510]
|
||||
[14:25:35.465] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.467] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
|
||||
[14:25:35.468] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
|
||||
[14:25:35.470] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.472] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
|
||||
[14:25:35.474] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.476] [DEBUG] PcapReader: Processing packet 11, layers: [0xc00043a690 0xc00044e640 0xc00031a780 0xc0004505a0]
|
||||
[14:25:35.478] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.480] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
|
||||
[14:25:35.481] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.483] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.485] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
|
||||
[14:25:35.487] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.489] [DEBUG] PcapReader: Processing packet 12, layers: [0xc00043a700 0xc00044e6e0 0xc00031a800 0xc000450630]
|
||||
[14:25:35.491] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.492] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
|
||||
[14:25:35.494] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:25:35.496] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:35.498] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
|
||||
[14:25:35.500] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.502] [DEBUG] PcapReader: Processing packet 13, layers: [0xc00043a770 0xc00044e780 0xc00031a880 0xc0004506c0]
|
||||
[14:25:35.504] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.505] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
|
||||
[14:25:35.507] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
|
||||
[14:25:35.509] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:35.511] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
|
||||
[14:25:35.513] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.515] [DEBUG] PcapReader: Processing packet 14, layers: [0xc00043a7e0 0xc00044e820 0xc00031a900 0xc000450750]
|
||||
[14:25:35.517] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.519] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
|
||||
[14:25:35.521] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.522] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.524] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
|
||||
[14:25:35.526] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.528] [DEBUG] PcapReader: Processing packet 15, layers: [0xc00043a850 0xc00044e8c0 0xc00031a980 0xc0004507e0]
|
||||
[14:25:35.530] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.532] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
|
||||
[14:25:35.534] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:25:35.535] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:35.537] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
|
||||
[14:25:35.539] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.541] [DEBUG] PcapReader: Processing packet 16, layers: [0xc00043a8c0 0xc00044e960 0xc00031aa00 0xc000450870]
|
||||
[14:25:35.543] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.545] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
|
||||
[14:25:35.546] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.548] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.550] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
|
||||
[14:25:35.552] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:25:35.554] [DEBUG] PcapReader: Processing packet 17, layers: [0xc00043a930 0xc00044ea00 0xc00031aa80 0xc000450900]
|
||||
[14:25:35.555] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.557] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
|
||||
[14:25:35.559] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:25:35.561] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:25:35.563] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
|
||||
[14:25:35.565] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.567] [DEBUG] PcapReader: Processing packet 18, layers: [0xc00043a9a0 0xc00044eaa0 0xc00031ab00 0xc000450990]
|
||||
[14:25:35.568] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.570] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
|
||||
[14:25:35.572] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
|
||||
[14:25:35.574] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.576] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
|
||||
[14:25:35.578] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.579] [DEBUG] PcapReader: Processing packet 19, layers: [0xc00043aa10 0xc00044eb40 0xc00031ab80 0xc000450a20]
|
||||
[14:25:35.581] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.583] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
|
||||
[14:25:35.585] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.587] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.589] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
|
||||
[14:25:35.591] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.592] [DEBUG] PcapReader: Processing packet 20, layers: [0xc00043aa80 0xc00044ebe0 0xc00031ac00 0xc000450ab0]
|
||||
[14:25:35.594] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.596] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
|
||||
[14:25:35.598] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:25:35.600] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:25:35.602] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
|
||||
[14:25:35.604] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.605] [DEBUG] PcapReader: Processing packet 21, layers: [0xc00043aaf0 0xc00044ec80 0xc00031ac80 0xc000450b40]
|
||||
[14:25:35.607] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.609] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
|
||||
[14:25:35.611] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:25:35.613] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:25:35.615] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
|
||||
[14:25:35.617] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.618] [DEBUG] PcapReader: Processing packet 22, layers: [0xc00043ab60 0xc00044ed20 0xc00031ad00 0xc000450bd0]
|
||||
[14:25:35.620] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.622] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
|
||||
[14:25:35.625] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.627] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.629] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
|
||||
[14:25:35.630] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.632] [DEBUG] PcapReader: Processing packet 23, layers: [0xc00043abd0 0xc00044edc0 0xc00031ad80 0xc000450c60]
|
||||
[14:25:35.634] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:25:35.636] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
|
||||
[14:25:35.638] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:25:35.640] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:25:35.642] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
|
||||
[14:25:35.644] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.645] [DEBUG] PcapReader: Processing packet 24, layers: [0xc00043ac40 0xc00044ee60 0xc00031ae00 0xc000450cf0]
|
||||
[14:25:35.647] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:25:35.649] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
|
||||
[14:25:35.651] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:25:35.652] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:25:35.654] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
|
||||
[14:25:35.656] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:25:35.658] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
|
||||
[14:28:06.938] [INFO] Telephony Inspector exited normally
|
||||
@@ -1,176 +0,0 @@
|
||||
[14:28:08.952] [INFO] Logger initialized: logs\2026-01-19_14-28-08.log
|
||||
[14:28:08.956] [INFO] Starting Telephony Inspector
|
||||
[14:28:12.252] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:28:12.256] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:28:12.260] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:28:12.264] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:28:12.267] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0000e3b20 0xc0000b8640 0xc0000e0280 0xc00037e000]
|
||||
[14:28:12.272] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.275] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
|
||||
[14:28:12.277] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
|
||||
[14:28:12.280] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:28:12.281] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||||
[14:28:12.283] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.285] [DEBUG] PcapReader: Processing packet 2, layers: [0xc0000e3b90 0xc0000b86e0 0xc0000e0300 0xc00037e090]
|
||||
[14:28:12.286] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.289] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||||
[14:28:12.290] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
|
||||
[14:28:12.292] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.294] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||||
[14:28:12.296] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.298] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0000e3c00 0xc0000b8780 0xc0000e0380 0xc00037e120]
|
||||
[14:28:12.300] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.302] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||||
[14:28:12.304] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.306] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.307] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||||
[14:28:12.309] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.311] [DEBUG] PcapReader: Processing packet 4, layers: [0xc0000e3c70 0xc0000b8820 0xc0000e0400 0xc00037e1b0]
|
||||
[14:28:12.313] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.315] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||||
[14:28:12.317] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:28:12.319] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:28:12.320] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||||
[14:28:12.322] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.324] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0000e3ce0 0xc0000b88c0 0xc0000e0480 0xc00037e240]
|
||||
[14:28:12.326] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.328] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
|
||||
[14:28:12.330] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
|
||||
[14:28:12.332] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:28:12.334] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||||
[14:28:12.335] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.337] [DEBUG] PcapReader: Processing packet 6, layers: [0xc0000e3d50 0xc0000b8960 0xc0000e0500 0xc00037e2d0]
|
||||
[14:28:12.339] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.341] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||||
[14:28:12.342] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.345] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.346] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||||
[14:28:12.348] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.350] [DEBUG] PcapReader: Processing packet 7, layers: [0xc0000e3dc0 0xc0000b8a00 0xc0000e0580 0xc00037e360]
|
||||
[14:28:12.352] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.354] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||||
[14:28:12.356] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:28:12.358] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:28:12.360] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||||
[14:28:12.361] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.363] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0000e3e30 0xc0000b8aa0 0xc0000e0600 0xc00037e3f0]
|
||||
[14:28:12.365] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.367] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||||
[14:28:12.369] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.371] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.373] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||||
[14:28:12.374] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:28:12.376] [DEBUG] PcapReader: Processing packet 9, layers: [0xc0000e3ea0 0xc0000b8b40 0xc0000e0680 0xc00037e480]
|
||||
[14:28:12.378] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.380] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
|
||||
[14:28:12.382] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
|
||||
[14:28:12.384] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:28:12.386] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
|
||||
[14:28:12.388] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.390] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0000e3f10 0xc0000b8be0 0xc0000e0700 0xc00037e510]
|
||||
[14:28:12.391] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.394] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
|
||||
[14:28:12.395] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
|
||||
[14:28:12.397] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.399] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
|
||||
[14:28:12.401] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.403] [DEBUG] PcapReader: Processing packet 11, layers: [0xc000498000 0xc0000b8c80 0xc0000e0780 0xc00037e5a0]
|
||||
[14:28:12.405] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.407] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
|
||||
[14:28:12.408] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.410] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.413] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
|
||||
[14:28:12.414] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.416] [DEBUG] PcapReader: Processing packet 12, layers: [0xc000498070 0xc0000b8d20 0xc0000e0800 0xc00037e630]
|
||||
[14:28:12.418] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.419] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
|
||||
[14:28:12.421] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:28:12.423] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:28:12.425] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
|
||||
[14:28:12.427] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.429] [DEBUG] PcapReader: Processing packet 13, layers: [0xc0004980e0 0xc0000b8dc0 0xc0000e0880 0xc00037e6c0]
|
||||
[14:28:12.431] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.433] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
|
||||
[14:28:12.434] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
|
||||
[14:28:12.436] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:28:12.438] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
|
||||
[14:28:12.440] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.442] [DEBUG] PcapReader: Processing packet 14, layers: [0xc000498150 0xc0000b8e60 0xc0000e0900 0xc00037e750]
|
||||
[14:28:12.444] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.446] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
|
||||
[14:28:12.448] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.449] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.451] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
|
||||
[14:28:12.453] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.455] [DEBUG] PcapReader: Processing packet 15, layers: [0xc0004981c0 0xc0000b8f00 0xc0000e0980 0xc00037e7e0]
|
||||
[14:28:12.457] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.459] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
|
||||
[14:28:12.461] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:28:12.462] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:28:12.464] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
|
||||
[14:28:12.466] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.468] [DEBUG] PcapReader: Processing packet 16, layers: [0xc000498230 0xc0000b8fa0 0xc0000e0a00 0xc00037e870]
|
||||
[14:28:12.470] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.472] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
|
||||
[14:28:12.474] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.476] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.482] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
|
||||
[14:28:12.484] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:28:12.485] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0004982a0 0xc0000b9040 0xc0000e0a80 0xc00037e900]
|
||||
[14:28:12.487] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.489] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
|
||||
[14:28:12.492] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:28:12.493] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:28:12.495] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
|
||||
[14:28:12.497] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.499] [DEBUG] PcapReader: Processing packet 18, layers: [0xc000498310 0xc0000b90e0 0xc0000e0b00 0xc00037e990]
|
||||
[14:28:12.501] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.504] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
|
||||
[14:28:12.505] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
|
||||
[14:28:12.507] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.509] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
|
||||
[14:28:12.511] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.513] [DEBUG] PcapReader: Processing packet 19, layers: [0xc000498380 0xc0000b9180 0xc0000e0b80 0xc00037ea20]
|
||||
[14:28:12.515] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.517] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
|
||||
[14:28:12.518] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.521] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.523] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
|
||||
[14:28:12.524] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.526] [DEBUG] PcapReader: Processing packet 20, layers: [0xc0004983f0 0xc0000b9220 0xc0000e0c00 0xc00037eab0]
|
||||
[14:28:12.528] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.530] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
|
||||
[14:28:12.532] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:28:12.534] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:28:12.535] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
|
||||
[14:28:12.537] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.539] [DEBUG] PcapReader: Processing packet 21, layers: [0xc000498460 0xc0000b92c0 0xc0000e0c80 0xc00037eb40]
|
||||
[14:28:12.541] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.543] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
|
||||
[14:28:12.545] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:28:12.547] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:28:12.548] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
|
||||
[14:28:12.550] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.552] [DEBUG] PcapReader: Processing packet 22, layers: [0xc0004984d0 0xc0000b9360 0xc0000e0d00 0xc00037ebd0]
|
||||
[14:28:12.554] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.555] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
|
||||
[14:28:12.558] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.559] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.561] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
|
||||
[14:28:12.563] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.565] [DEBUG] PcapReader: Processing packet 23, layers: [0xc000498540 0xc0000b9400 0xc0000e0d80 0xc00037ec60]
|
||||
[14:28:12.566] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:28:12.568] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
|
||||
[14:28:12.570] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:28:12.572] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:28:12.574] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
|
||||
[14:28:12.576] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.578] [DEBUG] PcapReader: Processing packet 24, layers: [0xc0004985b0 0xc0000b94a0 0xc0000e0e00 0xc00037ecf0]
|
||||
[14:28:12.579] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:28:12.581] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
|
||||
[14:28:12.583] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:28:12.585] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:28:12.587] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
|
||||
[14:28:12.588] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:28:12.591] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
|
||||
[14:32:56.152] [INFO] Telephony Inspector exited normally
|
||||
@@ -1,176 +0,0 @@
|
||||
[14:32:58.290] [INFO] Logger initialized: logs\2026-01-19_14-32-58.log
|
||||
[14:32:58.294] [INFO] Starting Telephony Inspector
|
||||
[14:33:08.977] [INFO] PcapReader: Creating reader for D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:33:08.981] [INFO] PcapReader: Opening file D:\Proyectos\telephony-inspector\data\calls.pcap
|
||||
[14:33:08.984] [INFO] PcapReader: File opened successfully, link type: Ethernet
|
||||
[14:33:08.989] [DEBUG] PcapReader: BPF filter set for SIP ports
|
||||
[14:33:08.993] [DEBUG] PcapReader: Processing packet 1, layers: [0xc0007da0e0 0xc0000b83c0 0xc0007fa000 0xc00022a090]
|
||||
[14:33:08.996] [DEBUG] PcapReader: Packet 1 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.001] [DEBUG] PcapReader: Packet 1 UDP 51416 -> 5060, payload len: 1153
|
||||
[14:33:09.002] [DEBUG] PcapReader: Packet 1 full payload preview: "INVITE sip:123456@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd4"
|
||||
[14:33:09.004] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:33:09.006] [DEBUG] PcapReader: Packet 1 detected as SIP, parsing...
|
||||
[14:33:09.008] [INFO] PcapReader: Found SIP packet 1: INVITE e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.010] [DEBUG] PcapReader: Processing packet 2, layers: [0xc0007da150 0xc0000b8500 0xc0007fa080 0xc00022a120]
|
||||
[14:33:09.012] [DEBUG] PcapReader: Packet 2 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.014] [DEBUG] PcapReader: Packet 2 UDP 5060 -> 51416, payload len: 382
|
||||
[14:33:09.015] [DEBUG] PcapReader: Packet 2 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001"
|
||||
[14:33:09.017] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.019] [DEBUG] PcapReader: Packet 2 detected as SIP, parsing...
|
||||
[14:33:09.021] [INFO] PcapReader: Found SIP packet 2: 100 e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.023] [DEBUG] PcapReader: Processing packet 3, layers: [0xc0007da1c0 0xc0000b86e0 0xc0007fa100 0xc00022a1b0]
|
||||
[14:33:09.025] [DEBUG] PcapReader: Packet 3 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.027] [DEBUG] PcapReader: Packet 3 UDP 5060 -> 51416, payload len: 1075
|
||||
[14:33:09.029] [DEBUG] PcapReader: Packet 3 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc988f0aca12d47aa900f472ea93fc0d6\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.030] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.033] [DEBUG] PcapReader: Packet 3 detected as SIP, parsing...
|
||||
[14:33:09.034] [INFO] PcapReader: Found SIP packet 3: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.036] [DEBUG] PcapReader: Processing packet 4, layers: [0xc0007da230 0xc0000b8780 0xc0007fa180 0xc00022a240]
|
||||
[14:33:09.038] [DEBUG] PcapReader: Packet 4 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.040] [DEBUG] PcapReader: Packet 4 UDP 51416 -> 5060, payload len: 371
|
||||
[14:33:09.042] [DEBUG] PcapReader: Packet 4 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjf0cf112e8b5d4759a3417bc63cd5481e\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:33:09.044] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:33:09.046] [DEBUG] PcapReader: Packet 4 detected as SIP, parsing...
|
||||
[14:33:09.047] [INFO] PcapReader: Found SIP packet 4: ACK e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.050] [DEBUG] PcapReader: Processing packet 5, layers: [0xc0007da2a0 0xc0000b8820 0xc0007fa200 0xc00022a2d0]
|
||||
[14:33:09.051] [DEBUG] PcapReader: Packet 5 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.053] [DEBUG] PcapReader: Packet 5 UDP 51416 -> 5060, payload len: 870
|
||||
[14:33:09.055] [DEBUG] PcapReader: Packet 5 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492"
|
||||
[14:33:09.057] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:33:09.059] [DEBUG] PcapReader: Packet 5 detected as SIP, parsing...
|
||||
[14:33:09.061] [INFO] PcapReader: Found SIP packet 5: UPDATE e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.063] [DEBUG] PcapReader: Processing packet 6, layers: [0xc001084000 0xc000c320a0 0xc001086000 0xc001088000]
|
||||
[14:33:09.065] [DEBUG] PcapReader: Packet 6 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.066] [DEBUG] PcapReader: Packet 6 UDP 5060 -> 51416, payload len: 939
|
||||
[14:33:09.068] [DEBUG] PcapReader: Packet 6 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj1453a8f281f04023b1a9d246fb587ca3\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.070] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.072] [DEBUG] PcapReader: Packet 6 detected as SIP, parsing...
|
||||
[14:33:09.074] [INFO] PcapReader: Found SIP packet 6: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.076] [DEBUG] PcapReader: Processing packet 7, layers: [0xc001084070 0xc000c32140 0xc001086080 0xc001088090]
|
||||
[14:33:09.077] [DEBUG] PcapReader: Packet 7 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.080] [DEBUG] PcapReader: Packet 7 UDP 51416 -> 5060, payload len: 400
|
||||
[14:33:09.082] [DEBUG] PcapReader: Packet 7 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=d715109fcadd492b8f"
|
||||
[14:33:09.083] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:33:09.085] [DEBUG] PcapReader: Packet 7 detected as SIP, parsing...
|
||||
[14:33:09.087] [INFO] PcapReader: Found SIP packet 7: BYE e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.089] [DEBUG] PcapReader: Processing packet 8, layers: [0xc0010840e0 0xc000c321e0 0xc001086100 0xc001088120]
|
||||
[14:33:09.091] [DEBUG] PcapReader: Packet 8 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.092] [DEBUG] PcapReader: Packet 8 UDP 5060 -> 51416, payload len: 416
|
||||
[14:33:09.094] [DEBUG] PcapReader: Packet 8 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj15f5d8bca6884d6794f27c43437f1201\r\nCall-ID: e06cb346194a4f9295d3a325b185912f\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.100] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.102] [DEBUG] PcapReader: Packet 8 detected as SIP, parsing...
|
||||
[14:33:09.104] [INFO] PcapReader: Found SIP packet 8: 200 e06cb346194a4f9295d3a325b185912f
|
||||
[14:33:09.106] [DEBUG] PcapReader: Processing packet 9, layers: [0xc001084150 0xc000c32280 0xc001086180 0xc0010881b0]
|
||||
[14:33:09.108] [DEBUG] PcapReader: Packet 9 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.109] [DEBUG] PcapReader: Packet 9 UDP 51416 -> 5060, payload len: 1160
|
||||
[14:33:09.112] [DEBUG] PcapReader: Packet 9 full payload preview: "INVITE sip:962791077@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0"
|
||||
[14:33:09.114] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:33:09.115] [DEBUG] PcapReader: Packet 9 detected as SIP, parsing...
|
||||
[14:33:09.117] [INFO] PcapReader: Found SIP packet 9: INVITE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.119] [DEBUG] PcapReader: Processing packet 10, layers: [0xc0010841c0 0xc000c32320 0xc001086200 0xc001088240]
|
||||
[14:33:09.121] [DEBUG] PcapReader: Packet 10 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.122] [DEBUG] PcapReader: Packet 10 UDP 5060 -> 51416, payload len: 385
|
||||
[14:33:09.124] [DEBUG] PcapReader: Packet 10 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001"
|
||||
[14:33:09.126] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.128] [DEBUG] PcapReader: Packet 10 detected as SIP, parsing...
|
||||
[14:33:09.130] [INFO] PcapReader: Found SIP packet 10: 100 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.132] [DEBUG] PcapReader: Processing packet 11, layers: [0xc001084230 0xc000c323c0 0xc001086280 0xc0010882d0]
|
||||
[14:33:09.134] [DEBUG] PcapReader: Packet 11 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.135] [DEBUG] PcapReader: Packet 11 UDP 5060 -> 51416, payload len: 1078
|
||||
[14:33:09.137] [DEBUG] PcapReader: Packet 11 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPj25f0f67dd6cb411ab3b6d48b1c0f9ca9\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.139] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.141] [DEBUG] PcapReader: Packet 11 detected as SIP, parsing...
|
||||
[14:33:09.142] [INFO] PcapReader: Found SIP packet 11: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.144] [DEBUG] PcapReader: Processing packet 12, layers: [0xc0010842a0 0xc000c32460 0xc001086300 0xc001088360]
|
||||
[14:33:09.146] [DEBUG] PcapReader: Packet 12 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.148] [DEBUG] PcapReader: Packet 12 UDP 51416 -> 5060, payload len: 374
|
||||
[14:33:09.150] [DEBUG] PcapReader: Packet 12 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj70a4a90d59254a4885b807deca2166fc\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:33:09.152] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:33:09.154] [DEBUG] PcapReader: Packet 12 detected as SIP, parsing...
|
||||
[14:33:09.156] [INFO] PcapReader: Found SIP packet 12: ACK a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.158] [DEBUG] PcapReader: Processing packet 13, layers: [0xc001084310 0xc000c32500 0xc001086380 0xc0010883f0]
|
||||
[14:33:09.159] [DEBUG] PcapReader: Packet 13 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.161] [DEBUG] PcapReader: Packet 13 UDP 51416 -> 5060, payload len: 874
|
||||
[14:33:09.163] [DEBUG] PcapReader: Packet 13 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f9"
|
||||
[14:33:09.165] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:33:09.167] [DEBUG] PcapReader: Packet 13 detected as SIP, parsing...
|
||||
[14:33:09.169] [INFO] PcapReader: Found SIP packet 13: UPDATE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.171] [DEBUG] PcapReader: Processing packet 14, layers: [0xc001084380 0xc000c325a0 0xc001086400 0xc001088480]
|
||||
[14:33:09.173] [DEBUG] PcapReader: Packet 14 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.175] [DEBUG] PcapReader: Packet 14 UDP 5060 -> 51416, payload len: 942
|
||||
[14:33:09.176] [DEBUG] PcapReader: Packet 14 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjda3c200bd4664b39b5d59177c5f53017\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.178] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.180] [DEBUG] PcapReader: Packet 14 detected as SIP, parsing...
|
||||
[14:33:09.182] [INFO] PcapReader: Found SIP packet 14: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.184] [DEBUG] PcapReader: Processing packet 15, layers: [0xc0010843f0 0xc000c32640 0xc001086480 0xc001088510]
|
||||
[14:33:09.186] [DEBUG] PcapReader: Packet 15 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.187] [DEBUG] PcapReader: Packet 15 UDP 51416 -> 5060, payload len: 403
|
||||
[14:33:09.189] [DEBUG] PcapReader: Packet 15 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=820adc6fe0694f93bc"
|
||||
[14:33:09.191] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:33:09.193] [DEBUG] PcapReader: Packet 15 detected as SIP, parsing...
|
||||
[14:33:09.195] [INFO] PcapReader: Found SIP packet 15: BYE a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.197] [DEBUG] PcapReader: Processing packet 16, layers: [0xc001084460 0xc000c326e0 0xc001086500 0xc0010885a0]
|
||||
[14:33:09.199] [DEBUG] PcapReader: Packet 16 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.201] [DEBUG] PcapReader: Packet 16 UDP 5060 -> 51416, payload len: 419
|
||||
[14:33:09.202] [DEBUG] PcapReader: Packet 16 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjcca874595f7840409818bf98eb6f7629\r\nCall-ID: a15e53524b304ebf9dd16209f9c95d18\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.204] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.206] [DEBUG] PcapReader: Packet 16 detected as SIP, parsing...
|
||||
[14:33:09.208] [INFO] PcapReader: Found SIP packet 16: 200 a15e53524b304ebf9dd16209f9c95d18
|
||||
[14:33:09.210] [DEBUG] PcapReader: Processing packet 17, layers: [0xc0010844d0 0xc000c32780 0xc001086580 0xc001088630]
|
||||
[14:33:09.212] [DEBUG] PcapReader: Packet 17 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.214] [DEBUG] PcapReader: Packet 17 UDP 51416 -> 5060, payload len: 1150
|
||||
[14:33:09.215] [DEBUG] PcapReader: Packet 17 full payload preview: "INVITE sip:3333@192.168.0.162 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:33:09.217] [DEBUG] isSIPPayload: Detected SIP method: INVITE
|
||||
[14:33:09.219] [DEBUG] PcapReader: Packet 17 detected as SIP, parsing...
|
||||
[14:33:09.221] [INFO] PcapReader: Found SIP packet 17: INVITE e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.223] [DEBUG] PcapReader: Processing packet 18, layers: [0xc001084540 0xc000c32820 0xc001086600 0xc0010886c0]
|
||||
[14:33:09.225] [DEBUG] PcapReader: Packet 18 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.227] [DEBUG] PcapReader: Packet 18 UDP 5060 -> 51416, payload len: 380
|
||||
[14:33:09.228] [DEBUG] PcapReader: Packet 18 full payload preview: "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001"
|
||||
[14:33:09.230] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.232] [DEBUG] PcapReader: Packet 18 detected as SIP, parsing...
|
||||
[14:33:09.233] [INFO] PcapReader: Found SIP packet 18: 100 e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.236] [DEBUG] PcapReader: Processing packet 19, layers: [0xc0010845b0 0xc000c328c0 0xc001086680 0xc001088750]
|
||||
[14:33:09.238] [DEBUG] PcapReader: Packet 19 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.239] [DEBUG] PcapReader: Packet 19 UDP 5060 -> 51416, payload len: 1073
|
||||
[14:33:09.242] [DEBUG] PcapReader: Packet 19 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjb6b83a62e76f41c58fe9b71e82af61a5\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.243] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.245] [DEBUG] PcapReader: Packet 19 detected as SIP, parsing...
|
||||
[14:33:09.247] [INFO] PcapReader: Found SIP packet 19: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.249] [DEBUG] PcapReader: Processing packet 20, layers: [0xc001084620 0xc000c32960 0xc001086700 0xc0010887e0]
|
||||
[14:33:09.251] [DEBUG] PcapReader: Packet 20 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.252] [DEBUG] PcapReader: Packet 20 UDP 51416 -> 5060, payload len: 369
|
||||
[14:33:09.255] [DEBUG] PcapReader: Packet 20 full payload preview: "ACK sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPj1ec8fc81ae324187a6feecaf02f04ff1\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:33:09.256] [DEBUG] isSIPPayload: Detected SIP method: ACK
|
||||
[14:33:09.258] [DEBUG] PcapReader: Packet 20 detected as SIP, parsing...
|
||||
[14:33:09.260] [INFO] PcapReader: Found SIP packet 20: ACK e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.262] [DEBUG] PcapReader: Processing packet 21, layers: [0xc001084690 0xc000c32a00 0xc001086780 0xc001088870]
|
||||
[14:33:09.263] [DEBUG] PcapReader: Packet 21 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.265] [DEBUG] PcapReader: Packet 21 UDP 51416 -> 5060, payload len: 869
|
||||
[14:33:09.268] [DEBUG] PcapReader: Packet 21 full payload preview: "UPDATE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb"
|
||||
[14:33:09.269] [DEBUG] isSIPPayload: Detected SIP method: UPDATE
|
||||
[14:33:09.271] [DEBUG] PcapReader: Packet 21 detected as SIP, parsing...
|
||||
[14:33:09.273] [INFO] PcapReader: Found SIP packet 21: UPDATE e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.275] [DEBUG] PcapReader: Processing packet 22, layers: [0xc001084700 0xc000c32aa0 0xc001086800 0xc001088900]
|
||||
[14:33:09.277] [DEBUG] PcapReader: Packet 22 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.278] [DEBUG] PcapReader: Packet 22 UDP 5060 -> 51416, payload len: 937
|
||||
[14:33:09.280] [DEBUG] PcapReader: Packet 22 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPja17c7b2ea9da425d85da051e336794c9\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.282] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.284] [DEBUG] PcapReader: Packet 22 detected as SIP, parsing...
|
||||
[14:33:09.286] [INFO] PcapReader: Found SIP packet 22: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.288] [DEBUG] PcapReader: Processing packet 23, layers: [0xc001084770 0xc000c32b40 0xc001086880 0xc001088990]
|
||||
[14:33:09.290] [DEBUG] PcapReader: Packet 23 IPv4 192.168.0.164 -> 192.168.0.162
|
||||
[14:33:09.291] [DEBUG] PcapReader: Packet 23 UDP 51416 -> 5060, payload len: 398
|
||||
[14:33:09.293] [DEBUG] PcapReader: Packet 23 full payload preview: "BYE sip:192.168.0.162:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nMax-Forwards: 70\r\nFrom: <sip:1001@192.168.0.162>;tag=c2ffb0450ac24fb098"
|
||||
[14:33:09.295] [DEBUG] isSIPPayload: Detected SIP method: BYE
|
||||
[14:33:09.297] [DEBUG] PcapReader: Packet 23 detected as SIP, parsing...
|
||||
[14:33:09.299] [INFO] PcapReader: Found SIP packet 23: BYE e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.301] [DEBUG] PcapReader: Processing packet 24, layers: [0xc0010847e0 0xc000c32be0 0xc001086900 0xc001088a20]
|
||||
[14:33:09.303] [DEBUG] PcapReader: Packet 24 IPv4 192.168.0.162 -> 192.168.0.164
|
||||
[14:33:09.304] [DEBUG] PcapReader: Packet 24 UDP 5060 -> 51416, payload len: 414
|
||||
[14:33:09.306] [DEBUG] PcapReader: Packet 24 full payload preview: "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 192.168.0.164:51416;rport=51416;received=192.168.0.164;branch=z9hG4bKPjc372eee10c754ece9a873f8e36a6a0e2\r\nCall-ID: e9270b7c047542ef9af488d27b82162e\r\nFrom: <sip:1001@192"
|
||||
[14:33:09.308] [DEBUG] isSIPPayload: Detected SIP response
|
||||
[14:33:09.310] [DEBUG] PcapReader: Packet 24 detected as SIP, parsing...
|
||||
[14:33:09.312] [INFO] PcapReader: Found SIP packet 24: 200 e9270b7c047542ef9af488d27b82162e
|
||||
[14:33:09.314] [INFO] PcapReader: Finished reading. Total packets: 24, SIP packets: 24
|
||||
[14:35:22.258] [INFO] Telephony Inspector exited normally
|
||||
14
network_map.json
Normal file
14
network_map.json
Normal file
@@ -0,0 +1,14 @@
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"name": "Windows",
|
||||
"ip": "192.168.0.164",
|
||||
"type": "Carrier"
|
||||
},
|
||||
{
|
||||
"name": "Asterisk",
|
||||
"ip": "192.168.0.162",
|
||||
"type": "PBX"
|
||||
}
|
||||
]
|
||||
}
|
||||
Reference in New Issue
Block a user