Your company here — click to reach over 10,000 unique daily visitors

svmap - Man Page

manual page for svmap.py v0.3.3


svmap.py [options] host1 host2 hostrange


Scans for SIP devices on a given network


svmap.py sipvicious.org/22 1.1.2-20.* 4.1.*.*

svmap.py -s session1 --randomize

svmap.py --resume session1 -v

svmap.py -p5060-5062 -m INVITE



show program's version number and exit

-h,  --help

show this help message and exit

-v,  --verbose

Increase verbosity

-q,  --quiet

Quiet mode

-p PORT, --port=PORT

Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100

-P PORT, --localport=PORT

Source port for our packets

-x IP, --externalip=IP

IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT


By default we bind to all interfaces. This option overrides that and binds to the specified ip address


This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.

-R,  --reportback

Send the author an exception traceback. Currently sends the command line parameters and the traceback

-A,  --autogetip

Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.

-s NAME, --save=NAME

save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans


resume a previous scan

-c,  --enablecompact

enable compact mode. Makes packets smaller but possibly less compatible


Scan random IP addresses

-i scan1, --input=scan1

Scan IPs which were found in a previous scan. Pass the session name as the argument

-I scan1, --inputtext=scan1

Scan IPs from a text file - use the same syntax as command line but with new lines instead of commas. Pass the file name as the argument

-m METHOD, --method=METHOD

Specify the request method - by default this is OPTIONS.

-d,  --debug

Print SIP messages received


Only send the first given number of messages (i.e. usually used to scan only X IPs)


Specify an extension - by default this is not set


Randomize scanning instead of scanning consecutive ip addresses


Scan the SRV records for SIP on the destination domain name.The targets have to be domain names - example.org domain1.com


Specify a name for the from header in requests

-6,  --ipv6

Scan an IPv6 address

SIPvicious SIP scanner searches for SIP devices on a given network.

Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program.  If not, see <http://www.gnu.org/licenses/>.

See Also

The full documentation for svmap.py can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.


June 2020 svmap.py v0.3.3