SS7 Operator Point Codes Database
Comprehensive reference of SS7 operator point codes for security research and network analysis. Includes ITU, ANSI, and TTC formats with security implications.
Zone-Area-ID (14-bit)
2-001-1Used in Europe, Africa, Asia-Pacific
Network-Cluster-Member (24-bit)
243-020-001Used in North America
Japanese standard (16-bit)
7-001-1Used in Japan and Korea
Major Global Operators
Network Codes
MCC: 310
MNC: 004, 005, 006, 010, 012, 013
Point Codes (ANSI)
243-020-001 (MSC New York)243-020-002 (MSC Los Angeles)Network Codes
MCC: 310
MNC: 070, 150, 170, 280, 380, 410
Point Codes (ANSI)
243-010-001 (MSC Dallas)243-010-010 (MSC Atlanta)Network Codes
MCC: 234
MNC: 15
Point Codes (ITU)
2-001-1 (MSC London)2-001-2 (MSC Manchester)Network Codes
MCC: 262
MNC: 01
Point Codes (ITU)
2-049-1 (MSC Berlin)2-049-2 (MSC Munich)Scanning point code ranges to identify active network elements and map network topology.
Mitigation: Implement point code filtering and rate limiting on SS7 firewalls.
Using point codes to identify target operators for focused attacks and vulnerability exploitation.
Mitigation: Obscure point code assignments where possible and implement topology hiding.
Building detailed network maps using point code relationships and interconnection patterns.
Mitigation: Deploy SS7 firewalls with comprehensive topology obfuscation.
- 1
Point Code Randomization
Implement dynamic point code assignment where technically feasible to prevent enumeration.
- 2
SS7 Firewall Deployment
Deploy comprehensive SS7 firewalls with point code filtering and whitelist-based access control.
- 3
Network Topology Obfuscation
Hide internal network structure from external parties using topology hiding techniques.
- 4
Regular Point Code Audits
Conduct periodic audits of point code assignments and access patterns to detect anomalies.
SS7 Attack Vectors
Comprehensive guide to SS7 vulnerabilities and exploitation techniques
SS7 Attack Sequences
Step-by-step attack methodologies and message flows
Testing Methodology
Professional approach to telecommunications security assessment
Security Tools
Professional tools for SS7 security testing and analysis