{"id":13344,"date":"2020-02-21T08:57:56","date_gmt":"2020-02-21T13:57:56","guid":{"rendered":"https:\/\/telium.io\/sicherheitsdatenbanken\/funktionen\/"},"modified":"2020-03-09T19:29:12","modified_gmt":"2020-03-10T00:29:12","slug":"funktionen","status":"publish","type":"page","link":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/","title":{"rendered":"Funktionen"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"260\" height=\"225\" title=\"Honeypot-Trap5\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png\" alt class=\"lazyload img-responsive wp-image-9021\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27260%27%20height%3D%27225%27%20viewBox%3D%270%200%20260%20225%27%3E%3Crect%20width%3D%27260%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5-200x173.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png 260w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 260px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Sicherheitsdatenbanken<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Die gr\u00f6\u00dften und anspruchsvollsten Telefonie-Hacking- und Betrugsdatenbanken<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:left top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECDATA<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf;font-size: 150%\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">FUNKTIONEN<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/vorteile\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-3 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/api\/\"><i class=\"fa-plug fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">API<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/haeufig-gestellte-fragen\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/preise-kaufen\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/lizenz\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">features<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-5 fusion-content-boxes-1 content-boxes-clean-horizontal content-left content-boxes-icon-on-side\" style=\"--awb-backgroundcolor:#efefef;--awb-hover-accent-color:#ff6600;--awb-circle-hover-accent-color:#ff6600;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-phone-numbers.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Betrugs-Telefonnummerndatenbank<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Die Fraud-Telefonnummern-Datenbank ist eine Liste von Telefonnummern, die im Verdacht stehen, \u00fcberall auf der Welt bei Betrug verwendet zu werden. Jede Sekunde werden der Datenbank neue Telefonnummern hinzugef\u00fcgt (24 Stunden pro Tag, 7 Tage pro Woche), um Zero-Day-Betrugszahlen zu erkennen. Jede Telefonnummer wird nach dem Risiko gewichtet, basierend auf der Anzahl der Versuche, die Nummer zu verwenden, der Anzahl der Ziele, bei denen Betrugsversuche auftreten, ob die Anzahl der Premiumsatz ist, der Anzahl der Tage seit der letzten Verwendung usw. Die Betrugsdatenbank von Telium wurde \u00fcber viele Jahre hinweg entwickelt und ist eines der gr\u00f6\u00dften und umfassendsten Betrugspr\u00e4ventionsinstrumente, die Tr\u00e4gern und Endnutzern gleicherma\u00dfen zur Verf\u00fcgung stehen.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-ip-address.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Hacker-IP-Adressdatenbank<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Die Hacker IP-Adressdatenbank ist eine Liste von IPv4- und IPv6-Adressen, die im Verdacht stehen, weltweit bei Telekommunikations-Hacking verwendet zu werden. Jede Sekunde werden der Datenbank neue IP-Adressen hinzugef\u00fcgt (24 Stunden pro Tag, 7 Tage pro Woche), um aktive Hacker und personen zu erkennen, die IP-Adressen verschieben (siehe Bewegungs-IP-Angriffserkennung unten). Jede IP-Adresse wird in Bezug auf das Risiko basierend auf der Anzahl der Hacking-Versuche von dieser IP-Adresse, der Anzahl der Ziele, bei denen Hacker angriffe, den Arten von Angriffen mit dieser IP-Adresse usw. gewichtet. Teliums Hacker-IP-Adressdatenbank wurde \u00fcber viele Jahre entwickelt und ist eines der gr\u00f6\u00dften und umfassendsten PBX-spezifischen Intrusion Prevention-Tools, die Carriern und Endbenutzern gleicherma\u00dfen zur Verf\u00fcgung stehen.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-moving-ip.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Verschieben der IP-Angriffserkennung<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Moving IP Attack Detection kann Hacker identifizieren, die sich st\u00e4ndig und schnell \u00e4ndernDE IP-Adressen. Professionelle Hacker verschieben jetzt ihre IP-Adressen durch gro\u00dfe Bereiche von IP-Adressen aus Clouds, VPN-Diensten, gro\u00dfen Subnetzen usw., um die Erkennung durch vereinfachte Tools wie fail2ban oder regul\u00e4re Firewalls zu vermeiden. SecData integriert eine vielzahl Sammlung von Datenpunkten, um die Erkennung von Hackern in dem Moment zu erm\u00f6glichen, in dem sie sich von einer neuen IP-Adresse aus mit der Telefonanlage verbinden.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-honeypot.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Weltweite Honeypots<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecData hat ein weltweites Netzwerk von &#8220;Honeypots&#8221; eingerichtet, um Hacker- und Betrugsinformationen weltweit zu erfassen. Bei diesen Honeypots handelt es sich um ungesicherte PBX-Anlagen, die auf Servern an mehr als 15 verschiedenen Standorten auf der ganzen Welt betrieben werden. Die Server sammeln Informationen \u00fcber die Quell-IP-Adressen von Hackern, Nummern, die sie anrufen wollen, Benutzeragenten, Exploits versucht, Benutzer-Agent-Profil, Ports f\u00fcr die Verbindung versucht, etc. Die Informationen werden dann zur sofortigen Verarbeitung an Telium \u00fcbermittelt und in die SecData eingelagert.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-socket-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">ReST-Schnittstelle<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecData verwendet eine einfache ReST-Schnittstelle (Representational State Transfer) f\u00fcr alle Abfragen. Eine ReST-Schnittstelle erm\u00f6glicht eine breite Palette von Ger\u00e4ten und Programmiersprachen, um mit SecData \u00fcber eine einfache URL zu interagieren, und Antworten k\u00f6nnen als Nur-Text, JSON und XML formatiert werden. Die mitgelieferte Dokumentation enth\u00e4lt Beispiele f\u00fcr die Abfrage von SecData aus verschiedenen Sprachen und Skripten (C, C++, PHP, Bash, etc.) und W\u00e4hlpl\u00e4nen (Asterisk).<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":13308,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-13344","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Funktionen - Sicherheitsdatenbanken - Telium<\/title>\n<meta name=\"description\" content=\"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Funktionen - Sicherheitsdatenbanken - Telium\" \/>\n<meta property=\"og:description\" content=\"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-10T00:29:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\",\"url\":\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\",\"name\":\"Funktionen - Sicherheitsdatenbanken - Telium\",\"isPartOf\":{\"@id\":\"https:\/\/telium.io\/de\/#website\"},\"datePublished\":\"2020-02-21T13:57:56+00:00\",\"dateModified\":\"2020-03-10T00:29:12+00:00\",\"description\":\"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.\",\"breadcrumb\":{\"@id\":\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/telium.io\/de\/startseite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsdatenbanken\",\"item\":\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Funktionen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/telium.io\/de\/#website\",\"url\":\"https:\/\/telium.io\/de\/\",\"name\":\"Telium\",\"description\":\"Telefonie und Telematik\",\"publisher\":{\"@id\":\"https:\/\/telium.io\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/telium.io\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/telium.io\/de\/#organization\",\"name\":\"Telium\",\"url\":\"https:\/\/telium.io\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png\",\"contentUrl\":\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\",\"https:\/\/x.com\/telium_io\",\"https:\/\/ca.linkedin.com\/company\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Funktionen - Sicherheitsdatenbanken - Telium","description":"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/","og_locale":"de_DE","og_type":"article","og_title":"Funktionen - Sicherheitsdatenbanken - Telium","og_description":"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.","og_url":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2020-03-10T00:29:12+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/","url":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/","name":"Funktionen - Sicherheitsdatenbanken - Telium","isPartOf":{"@id":"https:\/\/telium.io\/de\/#website"},"datePublished":"2020-02-21T13:57:56+00:00","dateModified":"2020-03-10T00:29:12+00:00","description":"\u00dcberpr\u00fcfen Sie eine Liste der wichtigsten Funktionen von Security Databases (SecData). Die gr\u00f6\u00dfte Datenbank der Telefonie mit Hacking-bezogenen IP-Adressen und Telefonnummern.","breadcrumb":{"@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/de\/startseite\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsdatenbanken","item":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/"},{"@type":"ListItem","position":3,"name":"Funktionen"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/de\/#website","url":"https:\/\/telium.io\/de\/","name":"Telium","description":"Telefonie und Telematik","publisher":{"@id":"https:\/\/telium.io\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/telium.io\/de\/#organization","name":"Telium","url":"https:\/\/telium.io\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/comments?post=13344"}],"version-history":[{"count":3,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13344\/revisions"}],"predecessor-version":[{"id":13347,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13344\/revisions\/13347"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13308"}],"wp:attachment":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/media?parent=13344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}