Difference between revisions of "VOIP phones"

From Sudo Room
Jump to navigation Jump to search
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
voip phones on the network
== voip phones on the network ==


ip address/name/extension - description
"I HACK AT 386" http://100.64.66.28/admin/advanced
https://wiki.voip.ms/article/Cisco_Linksys_SPA942_NA


 
== historical info for unknown things ==
100.64.64.31/5ud0r00m/7836 - that's us at sudoroom :)
 
100.64.64.32/door/3667 - frontdoor "pay"phone
 
100.64.64.33/ccl/225 - counter culture labs
 
100.64.64.34/pub/782 - public terminals
 
 
100.64.64.35/Voice_adminPage.htm
admin
admin
omniphonix
omniphonix
Line 23: Line 14:
http://www.dslreports.com/forum/r22145431-Unlock-I-think-I-bricked-my-Innomedia-MTA6328-2Re
http://www.dslreports.com/forum/r22145431-Unlock-I-think-I-bricked-my-Innomedia-MTA6328-2Re


1. Disconnect to WAN ( no internet).
# Disconnect to WAN ( no internet).
2. Connect the gizmo via WAN to computer and login to it using user id
# Connect the gizmo via WAN to computer and login to it using user id
»192.168.1.xx/
#:»192.168.1.xx/
id=user, pass=welcome
#:id=user, pass=welcome
3. cut and paste the following link aninter desktop computer & giant_robot_arm serial host]]
# cut and paste the following link aninter desktop computer & giant_robot_arm serial host]]
| [[User:jake|jake]] d press enter to Restore factory default
#:| [[User:jake|jake]] d press enter to Restore factory default
»192.168.1.xx/restore2.ssi
#:»192.168.1.xx/restore2.ssi
4. power cycle the gizmo and login to admin link with factory default password.
# power cycle the gizmo and login to admin link with factory default password.
»192.168.1.xx/Voice_adminPage.htm
#:»192.168.1.xx/Voice_adminPage.htm
id=admin, pass=slapshot (for V3.0.77, V3.0.75)
#:id=admin, pass=slapshot (for V3.0.77, V3.0.75)
5. Disable Provisioning
# Disable Provisioning
Menu--IP Network ---Provisioning Setting
#:Menu--IP Network ---Provisioning Setting
6. Change username and password!
# Change username and password!

Latest revision as of 19:45, 2 March 2024

voip phones on the network

"I HACK AT 386" http://100.64.66.28/admin/advanced https://wiki.voip.ms/article/Cisco_Linksys_SPA942_NA

historical info for unknown things

admin omniphonix http://innomedia.com/wp-content/uploads/2013/10/MTA-6328-2Re-DS.pdf 00:10:99:04:b7:ef

when you plug into its LAN port it gives you dhcp, you can go to http://192.168.251.1/Voice_adminPage.htm

http://www.dslreports.com/forum/r22145431-Unlock-I-think-I-bricked-my-Innomedia-MTA6328-2Re

  1. Disconnect to WAN ( no internet).
  2. Connect the gizmo via WAN to computer and login to it using user id
    »192.168.1.xx/
    id=user, pass=welcome
  3. cut and paste the following link aninter desktop computer & giant_robot_arm serial host]]
    | jake d press enter to Restore factory default
    »192.168.1.xx/restore2.ssi
  4. power cycle the gizmo and login to admin link with factory default password.
    »192.168.1.xx/Voice_adminPage.htm
    id=admin, pass=slapshot (for V3.0.77, V3.0.75)
  5. Disable Provisioning
    Menu--IP Network ---Provisioning Setting
  6. Change username and password!