{"id":13352,"date":"2020-02-21T08:57:56","date_gmt":"2020-02-21T13:57:56","guid":{"rendered":"https:\/\/telium.io\/bases-de-datos-de-seguridad\/funciones\/"},"modified":"2020-03-09T19:31:43","modified_gmt":"2020-03-10T00:31:43","slug":"funciones","status":"publish","type":"page","link":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/","title":{"rendered":"Funciones"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"260\" height=\"225\" title=\"honeypot-trap5\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png\" alt class=\"lazyload img-responsive wp-image-9023\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27260%27%20height%3D%27225%27%20viewBox%3D%270%200%20260%20225%27%3E%3Crect%20width%3D%27260%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5-200x173.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/honeypot-trap5.png 260w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 260px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Bases de Datos de Seguridad<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Las bases de datos de pirater\u00eda telef\u00f3nica y fraude m\u00e1s grandes y sofisticadas<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:left top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECDATA<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf;font-size: 150%\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">FUNCIONES<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/ventajas\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-3 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/tecnologia\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/api\/\"><i class=\"fa-plug fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">API<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/preguntas-frecuentes\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/precios-comprar\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/licencia\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">features<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-5 fusion-content-boxes-1 content-boxes-clean-horizontal content-left content-boxes-icon-on-side\" style=\"--awb-backgroundcolor:#efefef;--awb-hover-accent-color:#ff6600;--awb-circle-hover-accent-color:#ff6600;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-phone-numbers.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Datos de N\u00fameros de Tel\u00e9fono de Fraude<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La base de datos de n\u00fameros de tel\u00e9fono de fraude es una lista de n\u00fameros de tel\u00e9fono sospechosos de ser utilizados en fraude en cualquier parte del mundo. Los nuevos n\u00fameros de tel\u00e9fono se agregan continuamente a la base de datos cada segundo (24 horas al d\u00eda, 7 d\u00edas a la semana) para ayudar a detectar ataques de n\u00famero de fraude de d\u00eda cero. Cada n\u00famero de tel\u00e9fono se pondera en t\u00e9rminos de riesgo en funci\u00f3n del n\u00famero de intentos de utilizar el n\u00famero, el n\u00famero de objetivos que experimentan intentos de fraude, si el n\u00famero es la tasa de prima, el n\u00famero de d\u00edas desde el \u00faltimo uso, etc. La base de datos de fraude de Teliumse ha desarrollado a lo largo de muchos a\u00f1os y es una de las herramientas de prevenci\u00f3n de fraude m\u00e1s grandes y completas disponibles tanto para los transportistas como para los usuarios finales.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-ip-address.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Datos de Direcciones IP de Hackers<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La base de datos de direcciones IP de hackers es una lista de direcciones IPv4 e IPv6 sospechosas de ser utilizadas en la pirater\u00eda de telecomunicaciones en todo el mundo. Las nuevas direcciones IP se agregan continuamente a la base de datos cada segundo (24 horas al d\u00eda, 7 d\u00edas a la semana) para ayudar a detectar a los hackers activos y aquellos que est\u00e1n cambiando las direcciones IP (consulte Detecci\u00f3n de ataques de IP m\u00f3vil a continuaci\u00f3n). Cada direcci\u00f3n IP se pondera en t\u00e9rminos de riesgo basado en el n\u00famero de intentos de pirater\u00eda de esa direcci\u00f3n IP, el n\u00famero de objetivos que experimentan pirater\u00eda, los tipos de ataques que utilizan esa direcci\u00f3n IP, etc. La base de datos de direcciones IP de hackers de Teliumse ha desarrollado a lo largo de muchos a\u00f1os y es una de las herramientas de prevenci\u00f3n de intrusiones espec\u00edficas de PBX m\u00e1s grandes y completas disponibles tanto para los operadores como para los usuarios finales.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-moving-ip.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detecci\u00f3n de Ataques IP en Movimiento<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La detecci\u00f3n de ataques IP en movimiento puede identificar a los piratas inform\u00e1ticos que cambian constantemente y r\u00e1pidamente las direcciones IP. Los hackers profesionales ahora est\u00e1n moviendo sus direcciones IP a trav\u00e9s de grandes rangos de direcciones IP desde nubes, servicios VPN, subredes grandes, etc. para evitar la detecci\u00f3n por herramientas simplistas como fail2ban o firewalls regulares. SecData integra una colecci\u00f3n diversa de puntos de datos para permitir la detecci\u00f3n de hackers en el instante en que se conectan a la PBX desde una nueva direcci\u00f3n IP.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-honeypot.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Honeypots en Todo el Mundo<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecData ha configurado una red mundial de &#8220;honeypots&#8221; para capturar informaci\u00f3n de hacking y fraude en todo el mundo. Estos honeypots son PBX no seguros que operan en servidores ubicados en m\u00e1s de 15 ubicaciones diferentes en todo el mundo. Los servidores recopilan informaci\u00f3n sobre las direcciones IP de origen de los piratas inform\u00e1ticos, n\u00fameros a los que intentan llamar, agentes de usuario, exploits intentados, perfil de agente de usuario, puertos intentados para la conexi\u00f3n, etc. La informaci\u00f3n se transfiere a Telium para su procesamiento inmediato y se coloca en las bases de datos de SecData.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-socket-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaz ReST<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecData utiliza una interfaz Simple ReST (Representational State Transfer) para todas las consultas. Una interfaz ReST permite que una amplia gama de dispositivos y lenguajes de programaci\u00f3n interact\u00faen con SecData mediante una direcci\u00f3n URL simple, y las respuestas se pueden formatear como texto sin formato, JSON y XML. La documentaci\u00f3n incluida proporciona ejemplos de c\u00f3mo consultar servidores SecData desde varios lenguajes y scripts (C, C++, PHP, Bash, etc.) y planes de marcado (Asterisk).<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":13316,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-13352","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Funciones - Bases de datos de seguridad - Telium<\/title>\n<meta name=\"description\" content=\"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Funciones - Bases de datos de seguridad - Telium\" \/>\n<meta property=\"og:description\" content=\"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-10T00:31:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/funciones\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/funciones\\\/\",\"name\":\"Funciones - Bases de datos de seguridad - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\"},\"datePublished\":\"2020-02-21T13:57:56+00:00\",\"dateModified\":\"2020-03-10T00:31:43+00:00\",\"description\":\"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/funciones\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/funciones\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/funciones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bases de datos de seguridad\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/bases-de-datos-de-seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Funciones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"name\":\"Telium\",\"description\":\"Telefon\u00eda y Telem\u00e1tica\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Funciones - Bases de datos de seguridad - Telium","description":"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/","og_locale":"es_ES","og_type":"article","og_title":"Funciones - Bases de datos de seguridad - Telium","og_description":"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.","og_url":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2020-03-10T00:31:43+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/","url":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/","name":"Funciones - Bases de datos de seguridad - Telium","isPartOf":{"@id":"https:\/\/telium.io\/es\/#website"},"datePublished":"2020-02-21T13:57:56+00:00","dateModified":"2020-03-10T00:31:43+00:00","description":"Revise una lista de las principales caracter\u00edsticas que Bases de Datos de Seguridad de datos de seguridad (SecData). La base de datos m\u00e1s grande de telefon\u00eda de direcciones IP relacionadas con la pirater\u00eda y n\u00fameros de tel\u00e9fono.","breadcrumb":{"@id":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/funciones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/es\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Bases de datos de seguridad","item":"https:\/\/telium.io\/es\/bases-de-datos-de-seguridad\/"},{"@type":"ListItem","position":3,"name":"Funciones"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/es\/#website","url":"https:\/\/telium.io\/es\/","name":"Telium","description":"Telefon\u00eda y Telem\u00e1tica","publisher":{"@id":"https:\/\/telium.io\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/telium.io\/es\/#organization","name":"Telium","url":"https:\/\/telium.io\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/13352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/comments?post=13352"}],"version-history":[{"count":3,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/13352\/revisions"}],"predecessor-version":[{"id":13355,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/13352\/revisions\/13355"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/13316"}],"wp:attachment":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/media?parent=13352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}