You need to get access to the network traffic to capture the SIP messages. For SIP threats, some of them are handled automatically by the SBC, others need to be analyzed to understand if they are troublesome and can be blocked out or dropped from the system.