Passed
Push — master ( d17b5e...1c1fe7 )
by Kris
01:36
created
lib/ApiDefintion.php 2 patches
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -28,10 +28,10 @@  discard block
 block discarded – undo
28 28
  */
29 29
 abstract class ApiDefintion
30 30
 {
31
-     /**
32
-     * AbuseIPDB API v2 Endpoint
33
-     * @var string $api_endpoint  
34
-     */
31
+        /**
32
+         * AbuseIPDB API v2 Endpoint
33
+         * @var string $api_endpoint  
34
+         */
35 35
     protected $aipdbApiEndpoint = 'https://api.abuseipdb.com/api/v2/'; 
36 36
 
37 37
     /**
@@ -67,8 +67,8 @@  discard block
 block discarded – undo
67 67
         // Open proxy, open relay, or Tor exit node.
68 68
         ['openproxy'       , '9', 'Open Proxy', true],        
69 69
 
70
-         // Comment/forum spam, HTTP referer spam, or other CMS spam.
71
-         ['webspam'         , '10', 'Web Spam', true],        
70
+            // Comment/forum spam, HTTP referer spam, or other CMS spam.
71
+            ['webspam'         , '10', 'Web Spam', true],        
72 72
 
73 73
         // Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent
74 74
         // information (instead of log dumps) and be sure to remove PII if you want to remain anonymous.
@@ -117,7 +117,7 @@  discard block
 block discarded – undo
117 117
         // Abuse was targeted at an "Internet of Things" type device. Include 
118 118
         // information about what type of device was targeted in the comments.         
119 119
         ['oit'             , '23', 'IoT Targeted', true],     
120
-      ];
120
+        ];
121 121
 
122 122
     /**
123 123
      * Get the category id corresponding to given name
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
             if ($cat[0] === $categoryName) {
134 134
                 return $cat;
135 135
             }
136
-         }
136
+            }
137 137
 
138 138
         // not found
139 139
         return false;
@@ -150,9 +150,9 @@  discard block
 block discarded – undo
150 150
     public function getCategoryNameById(string $categoryId)
151 151
     {
152 152
         foreach ($this->aipdbApiCategories as $cat){
153
-           if ($cat[1] === $categoryId) {
154
-               return $cat;
155
-           }
153
+            if ($cat[1] === $categoryId) {
154
+                return $cat;
155
+            }
156 156
         }
157 157
 
158 158
         // not found
@@ -178,7 +178,7 @@  discard block
 block discarded – undo
178 178
             if ($cat[$index] === $value) {
179 179
                 return $i;
180 180
             }
181
-         }
181
+            }
182 182
 
183 183
         // not found
184 184
         return false;
Please login to merge, or discard this patch.
Spacing   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -41,82 +41,82 @@  discard block
 block discarded – undo
41 41
     protected $aipdbApiCategories = [
42 42
         
43 43
         // Altering DNS records resulting in improper redirection.        
44
-        ['dns-c'           , '1', 'DNS Compromise', true],    
44
+        [ 'dns-c', '1', 'DNS Compromise', true ],    
45 45
         
46 46
         // Falsifying domain server cache (cache poisoning).
47
-        ['dns-p'           , '2', 'DNS Poisoning', true],     
47
+        [ 'dns-p', '2', 'DNS Poisoning', true ],     
48 48
         
49 49
         // Fraudulent orders.
50
-        ['fraud-orders'    , '3', 'Fraud Orders', true],      
50
+        [ 'fraud-orders', '3', 'Fraud Orders', true ],      
51 51
 
52 52
         // Participating in distributed denial-of-service (usually part of botnet).        
53
-        ['ddos'            , '4', 'DDoS Attack', true],       
53
+        [ 'ddos', '4', 'DDoS Attack', true ],       
54 54
         
55 55
         // 
56
-        ['ftp-bf'          , '5', 'FTP Brute-Force', true],   
56
+        [ 'ftp-bf', '5', 'FTP Brute-Force', true ],   
57 57
         
58 58
         // Oversized IP packet.
59
-        ['pingdeath'       , '6', 'Ping of Death', true],     
59
+        [ 'pingdeath', '6', 'Ping of Death', true ],     
60 60
 
61 61
         // Phishing websites and/or email.
62
-        ['phishing'        , '7', 'Phishing', true],          
62
+        [ 'phishing', '7', 'Phishing', true ],          
63 63
         
64 64
         //
65
-        ['fraudvoip'       , '8', 'Fraud VoIP', true],        
65
+        [ 'fraudvoip', '8', 'Fraud VoIP', true ],        
66 66
 
67 67
         // Open proxy, open relay, or Tor exit node.
68
-        ['openproxy'       , '9', 'Open Proxy', true],        
68
+        [ 'openproxy', '9', 'Open Proxy', true ],        
69 69
 
70 70
          // Comment/forum spam, HTTP referer spam, or other CMS spam.
71
-         ['webspam'         , '10', 'Web Spam', true],        
71
+         [ 'webspam', '10', 'Web Spam', true ],        
72 72
 
73 73
         // Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent
74 74
         // information (instead of log dumps) and be sure to remove PII if you want to remain anonymous.
75
-        ['emailspam'       , '11', 'Email Spam', true],                                                   
75
+        [ 'emailspam', '11', 'Email Spam', true ],                                                   
76 76
              
77 77
         // CMS blog comment spam.
78
-        ['blogspam'        , '12', 'Blog Spam', true],      
78
+        [ 'blogspam', '12', 'Blog Spam', true ],      
79 79
         
80 80
         // Conjunctive category.
81
-        ['vpnip'           , '13', 'VPN IP', false], // to check alone ??           
81
+        [ 'vpnip', '13', 'VPN IP', false ], // to check alone ??           
82 82
 
83 83
         // Scanning for open ports and vulnerable services.
84
-        ['scan'            , '14', 'Port Scan', true],        
84
+        [ 'scan', '14', 'Port Scan', true ],        
85 85
        
86 86
         // seems to can't be used alone
87
-        ['hack'            , '15', 'Hacking', false],           
87
+        [ 'hack', '15', 'Hacking', false ],           
88 88
 
89 89
         // Attempts at SQL injection.
90
-        ['sql'             , '16', 'SQL Injection', true],     
90
+        [ 'sql', '16', 'SQL Injection', true ],     
91 91
         
92 92
         // Email sender spoofing.
93
-        ['spoof'           , '17', 'Spoofing', true],         
93
+        [ 'spoof', '17', 'Spoofing', true ],         
94 94
 
95 95
         // Credential brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc. 
96 96
         // This category is seperate from DDoS attacks.
97
-        ['brute'           , '18', 'Brute-Force', true],     
97
+        [ 'brute', '18', 'Brute-Force', true ],     
98 98
 
99 99
         // Webpage scraping (for email addresses, content, etc) and crawlers that do not honor robots.txt.                                  
100 100
         // Excessive requests and user agent spoofing can also be reported here.                        
101
-        ['badbot'          , '19', 'Bad Web Bot', true],      
101
+        [ 'badbot', '19', 'Bad Web Bot', true ],      
102 102
                                                          
103 103
         // Host is likely infected with malware and being used for other attacks or to host malicious content. 
104 104
         // The host owner may not be aware of the compromise. This category is often used in combination 
105 105
         // with other attack categories.
106
-        ['explhost'        , '20', 'Exploited Host', true],
106
+        [ 'explhost', '20', 'Exploited Host', true ],
107 107
         
108 108
         // Attempts to probe for or exploit installed web applications such as a CMS 
109 109
         // like WordPress/Drupal, e-commerce solutions, forum software, phpMyAdmin and 
110 110
         // various other software plugins/solutions.                                                         
111
-        ['webattack'       , '21', 'Web App Attack', true ],   
111
+        [ 'webattack', '21', 'Web App Attack', true ],   
112 112
         
113 113
         // Secure Shell (SSH) abuse. Use this category in combination 
114 114
         // with more specific categories.
115
-        ['ssh'             , '22', 'SSH', false],              
115
+        [ 'ssh', '22', 'SSH', false ],              
116 116
 
117 117
         // Abuse was targeted at an "Internet of Things" type device. Include 
118 118
         // information about what type of device was targeted in the comments.         
119
-        ['oit'             , '23', 'IoT Targeted', true],     
119
+        [ 'oit', '23', 'IoT Targeted', true ],     
120 120
       ];
121 121
 
122 122
     /**
@@ -129,8 +129,8 @@  discard block
 block discarded – undo
129 129
      */
130 130
     public function getCategoryIdbyName(string $categoryName)
131 131
     {
132
-        foreach ($this->aipdbApiCategories as $cat){
133
-            if ($cat[0] === $categoryName) {
132
+        foreach ($this->aipdbApiCategories as $cat) {
133
+            if ($cat[ 0 ] === $categoryName) {
134 134
                 return $cat;
135 135
             }
136 136
          }
@@ -149,8 +149,8 @@  discard block
 block discarded – undo
149 149
      */
150 150
     public function getCategoryNameById(string $categoryId)
151 151
     {
152
-        foreach ($this->aipdbApiCategories as $cat){
153
-           if ($cat[1] === $categoryId) {
152
+        foreach ($this->aipdbApiCategories as $cat) {
153
+           if ($cat[ 1 ] === $categoryId) {
154 154
                return $cat;
155 155
            }
156 156
         }
@@ -171,11 +171,11 @@  discard block
 block discarded – undo
171 171
     protected function getCategoryIndex(string $value, int $index)
172 172
     {
173 173
         $i = -1;
174
-        foreach ($this->aipdbApiCategories as $cat){
174
+        foreach ($this->aipdbApiCategories as $cat) {
175 175
             
176 176
             $i++;
177 177
 
178
-            if ($cat[$index] === $value) {
178
+            if ($cat[ $index ] === $value) {
179 179
                 return $i;
180 180
             }
181 181
          }
Please login to merge, or discard this patch.