Understanding the two authentication methods for VoIP calling and when to use each one.
SIP (Session Initiation Protocol) authentication uses a username and password to verify your identity when connecting to a VoIP server. When your softphone or PBX registers with the server, it sends credentials that are validated before any calls can be placed. This is the most common method used by individual users with apps like Zoiper, Linphone, or MicroSIP.
With SpoofGlobal, your SIP credentials are generated automatically when you create an account through the Telegram bot. You simply enter the username, password, and server address into your SIP app and you are ready to call.
IP2IP (also called IP-based authentication or IP whitelisting) verifies your identity based on your server's IP address instead of credentials. No username or password is needed — if your call comes from a whitelisted IP address, it is accepted. This method is preferred by businesses running PBX systems like Asterisk or FreeSWITCH where the server has a static IP.
With SpoofGlobal, you can register your server's IP address and connect directly without any credentials. Calls from your IP are automatically authenticated and routed.
| Feature | SIP Auth | IP2IP Auth |
|---|---|---|
| Authentication | Username + Password | IP Address |
| Best For | Individual users, softphones | PBX systems, servers |
| Setup Complexity | Easy — enter credentials | Easy — register IP |
| Security | Credentials can be shared | Locked to specific IP |
| Mobility | Works from any location | Fixed IP required |
| Concurrent Calls | Multiple per account | Unlimited from IP |
| VPN Compatible | Yes | Only if VPN has static IP |
Yes. You can have both SIP accounts and IP2IP access on the same SpoofGlobal account. Configure whichever works best for your setup.
IP2IP requires a static IP address. If your IP changes frequently, SIP authentication is the better choice.
IP2IP is slightly more secure since it cannot be used from unauthorized locations. SIP credentials could theoretically be shared. Both are safe for normal use.
Yes. Caller ID spoofing works identically with both authentication methods. Your chosen number displays regardless of how you connect.