Updated:Â Â 16/09/2024 Â 0855 AEST
SIP Protection &
why it's IMPORTANT
why it's IMPORTANT
Cloud Kinnekt's SIP Protect Module provides protection from SIP attacks.
Brute-force break-in attempts and Denial of Service attacks are quite frequent and an unpredictable threat.Â
Unprotected CloudPBX systems are very sensitive to these kind of attacks.
The most common consequences of this kind of network attack are system downtime, call quality issues due to an overloaded network, direct financial loss due to network instability and unauthorised calls being made on your account to high call rate overseas countries.
Our SIP Protection Module's main purpose is to prevent those attacks.Â
Advanced Threat Detection
Unlike other similar solutions, SIP Protect works with LIVE SIP traffic, constantly monitoring SIP packets being received.
Potential attacks are instantly detected and SIP Protect updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time, these are then listed in the table to the right and updated regularly.
To detect SIP attacks, SIP Protect uses the following advanced detection techniques: Pattern recognition, SIP Scanners protection (immediately blocking known SIP scanners), TFTP brute force protection, and SIP protocol anomaly detection.
Dynamic Blocking and Unblocking
SIP Protect features a fully automated attack protection system which blocks attacks more efficiently than most other solutions.
In the case of an attack, it updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time.
If attacks stop in a certain period of time, SIP Protect unblocks compromised IP addresses automatically.
Auto Provisioning Attack Detection
Auto-provisioning service is generally considered one of the most vulnerable spots of a CloudPBX system.
SIP Protect covers this segment as well through the integrated TFTP Brute Force attack detection. An active attacker can redirect profile provisioning request and change the configuration parameters. Then the attacker can redirect phone calls through a malicious server, change passwords, turn the phone into a bug, and exfiltrate system logs (including those numbers dialed by a user).
IP Address   Auto-Unblock In
58.84.136.185 6h14m9s
172.28.130.149 7h26m5s
121.200.6.76 13h40m34s
58.84.136.96 14h16m26s
58.84.145.28 22h9m1s
27.33.50.170
58.84.128.251
58.84.129.64
58.84.129.185
58.84.136.28
58.84.136.40
58.84.136.68
58.84.136.91
58.84.136.98
58.84.136.108
58.84.137.12
58.84.137.16
58.84.137.19
58.84.137.29
58.84.137.117
58.84.137.160
58.84.137.206
58.84.137.228
58.84.143.22
58.84.143.156
58.84.145.39
58.84.145.165
58.84.180.87
58.84.180.236
58.84.184.122
58.84.185.235
103.76.159.229
103.93.151.87
103.95.114.79
103.95.114.80
103.95.114.82
103.95.114.83
103.95.114.89
103.246.100.77
116.204.144.213
116.204.144.230
116.204.144.231
117.20.68.78
117.20.68.86
117.20.68.166
117.20.69.1
117.20.69.18
117.20.69.110
118.67.11.222
118.67.12.99
118.209.217.133
119.12.209.12
119.12.215.1
119.12.215.2
119.12.215.3
119.12.215.4
119.12.215.5
119.12.215.6
119.12.215.7
119.12.215.8
119.12.215.9
119.12.215.10
119.12.215.11
119.12.215.12
119.12.215.13
119.12.215.14
119.12.215.15
119.12.215.16
119.12.215.17
119.12.215.18
119.12.215.19
119.12.215.20
119.12.215.21
119.12.215.22
119.12.215.23
119.12.215.24
119.12.215.25
119.12.215.26
119.12.215.27
119.12.215.28
119.12.215.29
119.12.215.30
119.12.215.31
119.12.215.32
119.12.215.33
119.12.215.34
119.12.215.38
119.12.215.39
119.12.215.40
119.12.215.41
119.12.215.42
119.12.215.43
119.12.215.44
119.12.215.45
119.12.215.46
119.12.215.47
119.12.215.48
119.12.215.49
119.12.215.50
119.12.215.51
119.12.215.52
119.12.215.53
119.12.215.54
119.12.215.55
119.12.215.56
119.12.215.57
119.12.215.58
119.12.215.59
119.12.215.60
119.12.215.61
119.12.215.62
119.18.2.146
119.77.88.152
121.45.101.214
121.200.5.170
122.150.217.253
122.151.166.119
123.243.33.64
124.170.36.40
146.88.22.0
146.88.22.1
146.88.22.5
146.88.22.6
146.88.22.7
146.88.22.8
146.88.22.20
146.88.22.28
159.196.12.7
159.196.12.17
159.196.12.21
159.196.15.17
159.196.168.110
159.196.170.181
172.28.128.13
172.28.131.86
172.28.132.150
172.28.132.249
172.28.135.2
172.28.136.75
172.28.136.118
172.28.136.120
172.28.136.149
172.28.136.237
172.28.136.241
172.28.142.159
172.28.143.251
172.28.160.7
172.28.160.18
172.28.160.45
172.28.160.46
172.28.160.115
172.28.189.12
172.28.189.235
172.28.190.203
172.28.191.37
172.28.191.39
172.28.191.63
172.28.191.79
180.150.36.211
180.150.37.61
180.150.38.100
180.150.38.129
180.150.80.173
194.193.186.167
202.7.247.194
202.7.248.5
203.30.2.1
203.30.4.184
203.56.146.142
203.121.198.7
203.121.198.13
203.121.198.16
203.121.198.27
203.121.198.61
203.121.198.64
203.121.198.86
203.129.17.139