search for: z9hg4bk3b28fa36

Displaying 1 result from an estimated 1 matches for "z9hg4bk3b28fa36".

2008 Jun 30
5
sip extension compromised, need help blocking brute force attempts
...ease advice. --- sip debug --- Using INVITE request as basis request - 49f272293cd248d6174ceddf3eef1575 at 69.13.xx.xxx Sending to 74.52.112.162 : 5060 (NAT) Found user '211' Reliably Transmitting (NAT) to 74.52.112.162:5060: SIP/2.0 403 Forbidden Via: SIP/2.0/UDP 74.52.112.162:5060;branch=z9hG4bK3b28fa36;received=74.52.112.162;rport=5060 From: "ASLPLS" <sip:211 at 69.13.xx.xxx>;tag=as130a4d39 To: <sip:19037292454 at 69.13.xx.xxx>;tag=as0c69057b Call-ID: 49f272293cd248d6174ceddf3eef1575 at 69.13.xx.xxx CSeq: 103 INVITE User-Agent: Asterisk PBX llow: INVITE, ACK, CANCEL, OPTIONS...