SIP Port Scanner
Plan SIP port checks across hosts with TCP, UDP, and TLS profiles, timeout settings, concurrency, response details, and scan logs.
IP, domain, or CIDR (e.g. 192.168.1.0/24)
Wait time per port
Concurrent connections
TCP Connect check
Probe TCP connection to the port
Send SIP OPTIONS
Send SIP OPTIONS to probe the service
Send SIP REGISTER (experimental)BETA
Send SIP REGISTER with dummy credentials
User-Agent header used when sending SIP messages
These options apply when integrating a real backend. In simulation mode, they only affect headers sent with SIP OPTIONS.
Total hosts
0
Open ports
0
Closed ports
0
Total scanned
0
Elapsed
00:00:00
No response data yet.
Log is empty.
SIP Port Scanner offers a full SIP port scanning interface for planning VoIP network checks, drafting reports, and validating UI behavior before pushing into CI/CD. Since browsers cannot open arbitrary TCP/UDP sockets, the tool runs in structured simulation mode — results are generated deterministically from the target and the port list you pick, so the same configuration always yields the same report.
Draft scan checklists before handing off to the deployment team, produce demo reports for clients, compare results against nmap -sU -sT -p, or teach a QA team how to distinguish open, closed, and filtered ports without touching real infrastructure.
Simulated results share the same schema as the JSON the tool exports. You can build a backend running sipsak or nmap, then import the result file into the tool to visualize and share the report.
No request leaves your machine. All simulation runs in the page's JavaScript. Enter internal IPs freely — no server receives any of it.
Supports single ports (5060), port ranges (5060-5070), and protocols via slash (5060/tcp, 5060/udp).
No. The browser sandbox blocks raw socket access to arbitrary TCP/UDP, so SIP Port Scanner runs in structured simulation mode: it produces consistent results from the target and selected ports so you can preview the report, test the UI, and export the output. For real scanning, run `nmap`, `sipsak`, or a dedicated backend and feed the data into this tool via JSON import.
None. All simulation logic, reports, logs, and exports run inside this tab. Close the tab and the data is gone.
Pick 'Custom' in Port Range to open the free-form input. Supported formats: single port (5060), port range (5000-5100), and comma list (5060,5061,5070-5075).
The number of simulated tasks running in parallel per scan round. Higher values finish faster but produce denser logs. In real environments, this is the ceiling of concurrent connections your backend should hold.
In the simulated report, secondary ports (5080, 5081) often return 'Connection refused' to illustrate the behavior of a SIP server not listening on those ports. In real environments, the same error appears when the firewall rejects with RST or the application is not bound to the port.
Yes. The 'Export results' button packs summary, result list, and log into a JSON file downloaded to your device. Use it to attach to tickets, store scan history, or compare against earlier runs.