Provided by: sipvicious_0.3.3-2_all 

NAME
svmap.py - scanner that searches for SIP devices on a given network
SYNOPSIS
svmap.py [options] host1 host2 hostrange
DESCRIPTION
Scans for SIP devices on a given network
examples:
svmap.py 10.0.0.1-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1-20 1.1.2-20.* 4.1.*.*
svmap.py -s session1 --randomize 10.0.0.1/8
svmap.py --resume session1 -v
svmap.py -p5060-5062 10.0.0.3-20 -m INVITE
OPTIONS
--version
show program's version number and exit
-h, --help
show this help message and exit
-v, --verbose
Increase verbosity
-q, --quiet
Quiet mode
-p PORT, --port=PORT
Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100
-P PORT, --localport=PORT
Source port for our packets
-x IP, --externalip=IP
IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are
behind NAT
-b BINDINGIP, --bindingip=BINDINGIP
By default we bind to all interfaces. This option overrides that and binds to the specified ip
address
-t SELECTTIME, --timeout=SELECTTIME
This option allows you to trottle the speed at which packets are sent. Change this if you're
losing packets. For example try 0.5.
-R, --reportback
Send the author an exception traceback. Currently sends the command line parameters and the
traceback
-A, --autogetip
Automatically get the current IP address. This is useful when you are not getting any responses
back due to SIPVicious not resolving your local IP.
-s NAME, --save=NAME
save the session. Has the benefit of allowing you to resume a previous scan and allows you to
export scans
--resume=NAME
resume a previous scan
-c, --enablecompact
enable compact mode. Makes packets smaller but possibly less compatible
--randomscan
Scan random IP addresses
-i scan1, --input=scan1
Scan IPs which were found in a previous scan. Pass the session name as the argument
-I scan1, --inputtext=scan1
Scan IPs from a text file - use the same syntax as command line but with new lines instead of
commas. Pass the file name as the argument
-m METHOD, --method=METHOD
Specify the request method - by default this is OPTIONS.
-d, --debug
Print SIP messages received
--first=FIRST
Only send the first given number of messages (i.e. usually used to scan only X IPs)
-e EXTENSION, --extension=EXTENSION
Specify an extension - by default this is not set
--randomize
Randomize scanning instead of scanning consecutive ip addresses
--srv Scan the SRV records for SIP on the destination domain name.The targets have to be domain names -
example.org domain1.com
--fromname=FROMNAME
Specify a name for the from header in requests
-6, --ipv6
Scan an IPv6 address
SIPvicious SIP scanner searches for SIP devices on a given network.
Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
This program is free software: you can redistribute it and/or modify it under the terms of the GNU
General Public License as published by the Free Software Foundation, either version 3 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without
even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If
not, see <http://www.gnu.org/licenses/>.
SEE ALSO
The full documentation for svmap.py can be found on GitHub at
<https://github.com/enablesecurity/sipvicious/wiki>.
svmap.py v0.3.3 June 2020 SVMAP(1)