Updated:    16/09/2024   0855 AEST

SIP Protection &
why it's IMPORTANT

Cloud Kinnekt's SIP Protect Module provides protection from SIP attacks.
Brute-force break-in attempts and Denial of Service attacks are quite frequent and an unpredictable threat. 

Unprotected CloudPBX systems are very sensitive to these kind of attacks.
The most common consequences of this kind of network attack are system downtime, call quality issues due to an overloaded network, direct financial loss due to network instability and unauthorised calls being made on your account to high call rate overseas countries.

Our SIP Protection Module's main purpose is to prevent those attacks. 


Advanced Threat Detection

Unlike other similar solutions, SIP Protect works with LIVE SIP traffic, constantly monitoring SIP packets being received.
Potential attacks are instantly detected and SIP Protect updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time, these are then listed in the table to the right and updated regularly.
To detect SIP attacks, SIP Protect uses the following advanced detection techniques: Pattern recognition, SIP Scanners protection (immediately blocking known SIP scanners), TFTP brute force protection, and SIP protocol anomaly detection.

Dynamic Blocking and Unblocking

SIP Protect features a fully automated attack protection system which blocks attacks more efficiently than most other solutions.

In the case of an attack, it updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time.

If attacks stop in a certain period of time, SIP Protect unblocks compromised IP addresses automatically.


Auto Provisioning Attack Detection

Auto-provisioning service is generally considered one of the most vulnerable spots of a CloudPBX system.

SIP Protect covers this segment as well through the integrated TFTP Brute Force attack detection. An active attacker can redirect profile provisioning request and change the configuration parameters. Then the attacker can redirect phone calls through a malicious server, change passwords, turn the phone into a bug, and exfiltrate system logs (including those numbers dialed by a user).


IP Address     Auto-Unblock In

58.84.136.185 6h14m9s

172.28.130.149 7h26m5s

121.200.6.76 13h40m34s

58.84.136.96 14h16m26s

58.84.145.28 22h9m1s

27.33.50.170

58.84.128.251

58.84.129.64

58.84.129.185

58.84.136.28

58.84.136.40

58.84.136.68

58.84.136.91

58.84.136.98

58.84.136.108

58.84.137.12

58.84.137.16

58.84.137.19

58.84.137.29

58.84.137.117

58.84.137.160

58.84.137.206

58.84.137.228

58.84.143.22

58.84.143.156

58.84.145.39

58.84.145.165

58.84.180.87

58.84.180.236

58.84.184.122

58.84.185.235

103.76.159.229

103.93.151.87

103.95.114.79

103.95.114.80

103.95.114.82

103.95.114.83

103.95.114.89

103.246.100.77

116.204.144.213

116.204.144.230

116.204.144.231

117.20.68.78

117.20.68.86

117.20.68.166

117.20.69.1

117.20.69.18

117.20.69.110

118.67.11.222

118.67.12.99

118.209.217.133

119.12.209.12

119.12.215.1

119.12.215.2

119.12.215.3

119.12.215.4

119.12.215.5

119.12.215.6

119.12.215.7

119.12.215.8

119.12.215.9

119.12.215.10

119.12.215.11

119.12.215.12

119.12.215.13

119.12.215.14

119.12.215.15

119.12.215.16

119.12.215.17

119.12.215.18

119.12.215.19

119.12.215.20

119.12.215.21

119.12.215.22

119.12.215.23

119.12.215.24

119.12.215.25

119.12.215.26

119.12.215.27

119.12.215.28

119.12.215.29

119.12.215.30

119.12.215.31

119.12.215.32

119.12.215.33

119.12.215.34

119.12.215.38

119.12.215.39

119.12.215.40

119.12.215.41

119.12.215.42

119.12.215.43

119.12.215.44

119.12.215.45

119.12.215.46

119.12.215.47

119.12.215.48

119.12.215.49

119.12.215.50

119.12.215.51

119.12.215.52

119.12.215.53

119.12.215.54

119.12.215.55

119.12.215.56

119.12.215.57

119.12.215.58

119.12.215.59

119.12.215.60

119.12.215.61

119.12.215.62

119.18.2.146

119.77.88.152

121.45.101.214

121.200.5.170

122.150.217.253

122.151.166.119

123.243.33.64

124.170.36.40

146.88.22.0

146.88.22.1

146.88.22.5

146.88.22.6

146.88.22.7

146.88.22.8

146.88.22.20

146.88.22.28

159.196.12.7

159.196.12.17

159.196.12.21

159.196.15.17

159.196.168.110

159.196.170.181

172.28.128.13

172.28.131.86

172.28.132.150

172.28.132.249

172.28.135.2

172.28.136.75

172.28.136.118

172.28.136.120

172.28.136.149

172.28.136.237

172.28.136.241

172.28.142.159

172.28.143.251

172.28.160.7

172.28.160.18

172.28.160.45

172.28.160.46

172.28.160.115

172.28.189.12

172.28.189.235

172.28.190.203

172.28.191.37

172.28.191.39

172.28.191.63

172.28.191.79

180.150.36.211

180.150.37.61

180.150.38.100

180.150.38.129

180.150.80.173

194.193.186.167

202.7.247.194

202.7.248.5

203.30.2.1

203.30.4.184

203.56.146.142

203.121.198.7

203.121.198.13

203.121.198.16

203.121.198.27

203.121.198.61

203.121.198.64

203.121.198.86

203.129.17.139