The world of VoIP has exploded in popularity, providing a flexible and often cost-effective alternative to traditional phone lines. However, the anonymity it offers can also be exploited by malicious actors seeking to conceal their identity. A critical challenge for investigators and security professionals is identifying non-VoIP numbers disguised