SIP Scanner hell again

(1/2) > >>

Hortoristic:
Been some time since I've messed with call strings but I'm being attacked by:
From 'ipphone' SP2(ipphone)

Here is my X_InboundCallRoute (partial):
{(x|xx|xxx|xxxx|xxxx|xxxxxx|un@@.):},{ph}

Since "ipphone" meets the string setting "xxxxxxx" - it's considered valid, so it rings.

The X_InboundCallRoute has worked for me for years; can I just somehow block any names like "ipphone"?

Sorry for rookie questions; just been awhile.

Hortoristic:
I'm taking a shot and testing if this one works:

I think the ipphon@@. part will block anything that begins with ipphone

{(x|xx|xxx|xxxx|xxxx|xxxxxx|ipphon@@.|un@@.):},{ph}

Hortoristic:
Since I was getting a call every 5 minutes and haven't for 15 minutes; I'm guessing my change worked.

Can anyone clarify this is how I block callers too?

Would this change block any calls from: 2534876767
{(x|xx|xxx|xxxx|xxxx|xxxxxx|ipphon@@.|un@@.|2534876767):},{ph}

Taoman:
Who is your provider? Do they have few enough SIP server IP addresses that you can use X_AccessList?

gderf:
The 'Oleg Method' would probably be a better approach if it can be used.

Navigation

[0] Message Index

[#] Next page