I can’t see why it wouldn’t be normal for an attacker. There is no reason why the From header should even contain an IP address, as against a domain name, and if you don’t want direct return calls (most SIP systems are configured to reject direct calls), there is no reason for the domain part to be valid, as most people will try to use the user part as a phone number, rather than as part of a fully fledged SIP URI.
In fact, it would seem that a large proportion of users, including FreePBX itself, configure Asterisk to ignore even contact and via headers, using options designed to cope with bad NAT setups, which send local addresses, instead.
It does look like, for some strange reason, chan_sip might only includes the address in the security log for INVITE and not for REGISTER, but chan_sip is no longer supported, anyway, so the correct solution is to upgrade. I also note that the version of Asterisk you are using is at least three months beyond full end of life (and Ubuntu are probably using an even older sub-version), so there will, almost certainly, be actual unpatched vulnerabilities, not just limitations to the reporting of successful defences. p->recv contains the address.
case SIP_INVITE:
res = handle_request_invite(p, req, addr, seqno, recount, e, nounlock);
if (res < 9) {
sip_report_security_event(NULL, &p->recv, p, req, res);
}
res = handle_request_register(p, req, addr, e);
sip_report_security_event(p->exten, NULL, p, req, res);