@@ -28,10 +28,10 @@ discard block |
||
| 28 | 28 | */ |
| 29 | 29 | abstract class ApiDefintion |
| 30 | 30 | { |
| 31 | - /** |
|
| 32 | - * AbuseIPDB API v2 Endpoint |
|
| 33 | - * @var string $api_endpoint |
|
| 34 | - */ |
|
| 31 | + /** |
|
| 32 | + * AbuseIPDB API v2 Endpoint |
|
| 33 | + * @var string $api_endpoint |
|
| 34 | + */ |
|
| 35 | 35 | protected $aipdbApiEndpoint = 'https://api.abuseipdb.com/api/v2/'; |
| 36 | 36 | |
| 37 | 37 | /** |
@@ -67,8 +67,8 @@ discard block |
||
| 67 | 67 | // Open proxy, open relay, or Tor exit node. |
| 68 | 68 | ['openproxy' , '9', 'Open Proxy', true], |
| 69 | 69 | |
| 70 | - // Comment/forum spam, HTTP referer spam, or other CMS spam. |
|
| 71 | - ['webspam' , '10', 'Web Spam', true], |
|
| 70 | + // Comment/forum spam, HTTP referer spam, or other CMS spam. |
|
| 71 | + ['webspam' , '10', 'Web Spam', true], |
|
| 72 | 72 | |
| 73 | 73 | // Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent |
| 74 | 74 | // information (instead of log dumps) and be sure to remove PII if you want to remain anonymous. |
@@ -117,7 +117,7 @@ discard block |
||
| 117 | 117 | // Abuse was targeted at an "Internet of Things" type device. Include |
| 118 | 118 | // information about what type of device was targeted in the comments. |
| 119 | 119 | ['oit' , '23', 'IoT Targeted', true], |
| 120 | - ]; |
|
| 120 | + ]; |
|
| 121 | 121 | |
| 122 | 122 | /** |
| 123 | 123 | * Get the category id corresponding to given name |
@@ -133,7 +133,7 @@ discard block |
||
| 133 | 133 | if ($cat[0] === $categoryName) { |
| 134 | 134 | return $cat; |
| 135 | 135 | } |
| 136 | - } |
|
| 136 | + } |
|
| 137 | 137 | |
| 138 | 138 | // not found |
| 139 | 139 | return false; |
@@ -150,9 +150,9 @@ discard block |
||
| 150 | 150 | public function getCategoryNameById(string $categoryId) |
| 151 | 151 | { |
| 152 | 152 | foreach ($this->aipdbApiCategories as $cat){ |
| 153 | - if ($cat[1] === $categoryId) { |
|
| 154 | - return $cat; |
|
| 155 | - } |
|
| 153 | + if ($cat[1] === $categoryId) { |
|
| 154 | + return $cat; |
|
| 155 | + } |
|
| 156 | 156 | } |
| 157 | 157 | |
| 158 | 158 | // not found |
@@ -178,7 +178,7 @@ discard block |
||
| 178 | 178 | if ($cat[$index] === $value) { |
| 179 | 179 | return $i; |
| 180 | 180 | } |
| 181 | - } |
|
| 181 | + } |
|
| 182 | 182 | |
| 183 | 183 | // not found |
| 184 | 184 | return false; |
@@ -41,82 +41,82 @@ discard block |
||
| 41 | 41 | protected $aipdbApiCategories = [ |
| 42 | 42 | |
| 43 | 43 | // Altering DNS records resulting in improper redirection. |
| 44 | - ['dns-c' , '1', 'DNS Compromise', true], |
|
| 44 | + [ 'dns-c', '1', 'DNS Compromise', true ], |
|
| 45 | 45 | |
| 46 | 46 | // Falsifying domain server cache (cache poisoning). |
| 47 | - ['dns-p' , '2', 'DNS Poisoning', true], |
|
| 47 | + [ 'dns-p', '2', 'DNS Poisoning', true ], |
|
| 48 | 48 | |
| 49 | 49 | // Fraudulent orders. |
| 50 | - ['fraud-orders' , '3', 'Fraud Orders', true], |
|
| 50 | + [ 'fraud-orders', '3', 'Fraud Orders', true ], |
|
| 51 | 51 | |
| 52 | 52 | // Participating in distributed denial-of-service (usually part of botnet). |
| 53 | - ['ddos' , '4', 'DDoS Attack', true], |
|
| 53 | + [ 'ddos', '4', 'DDoS Attack', true ], |
|
| 54 | 54 | |
| 55 | 55 | // |
| 56 | - ['ftp-bf' , '5', 'FTP Brute-Force', true], |
|
| 56 | + [ 'ftp-bf', '5', 'FTP Brute-Force', true ], |
|
| 57 | 57 | |
| 58 | 58 | // Oversized IP packet. |
| 59 | - ['pingdeath' , '6', 'Ping of Death', true], |
|
| 59 | + [ 'pingdeath', '6', 'Ping of Death', true ], |
|
| 60 | 60 | |
| 61 | 61 | // Phishing websites and/or email. |
| 62 | - ['phishing' , '7', 'Phishing', true], |
|
| 62 | + [ 'phishing', '7', 'Phishing', true ], |
|
| 63 | 63 | |
| 64 | 64 | // |
| 65 | - ['fraudvoip' , '8', 'Fraud VoIP', true], |
|
| 65 | + [ 'fraudvoip', '8', 'Fraud VoIP', true ], |
|
| 66 | 66 | |
| 67 | 67 | // Open proxy, open relay, or Tor exit node. |
| 68 | - ['openproxy' , '9', 'Open Proxy', true], |
|
| 68 | + [ 'openproxy', '9', 'Open Proxy', true ], |
|
| 69 | 69 | |
| 70 | 70 | // Comment/forum spam, HTTP referer spam, or other CMS spam. |
| 71 | - ['webspam' , '10', 'Web Spam', true], |
|
| 71 | + [ 'webspam', '10', 'Web Spam', true ], |
|
| 72 | 72 | |
| 73 | 73 | // Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent |
| 74 | 74 | // information (instead of log dumps) and be sure to remove PII if you want to remain anonymous. |
| 75 | - ['emailspam' , '11', 'Email Spam', true], |
|
| 75 | + [ 'emailspam', '11', 'Email Spam', true ], |
|
| 76 | 76 | |
| 77 | 77 | // CMS blog comment spam. |
| 78 | - ['blogspam' , '12', 'Blog Spam', true], |
|
| 78 | + [ 'blogspam', '12', 'Blog Spam', true ], |
|
| 79 | 79 | |
| 80 | 80 | // Conjunctive category. |
| 81 | - ['vpnip' , '13', 'VPN IP', false], // to check alone ?? |
|
| 81 | + [ 'vpnip', '13', 'VPN IP', false ], // to check alone ?? |
|
| 82 | 82 | |
| 83 | 83 | // Scanning for open ports and vulnerable services. |
| 84 | - ['scan' , '14', 'Port Scan', true], |
|
| 84 | + [ 'scan', '14', 'Port Scan', true ], |
|
| 85 | 85 | |
| 86 | 86 | // seems to can't be used alone |
| 87 | - ['hack' , '15', 'Hacking', false], |
|
| 87 | + [ 'hack', '15', 'Hacking', false ], |
|
| 88 | 88 | |
| 89 | 89 | // Attempts at SQL injection. |
| 90 | - ['sql' , '16', 'SQL Injection', true], |
|
| 90 | + [ 'sql', '16', 'SQL Injection', true ], |
|
| 91 | 91 | |
| 92 | 92 | // Email sender spoofing. |
| 93 | - ['spoof' , '17', 'Spoofing', true], |
|
| 93 | + [ 'spoof', '17', 'Spoofing', true ], |
|
| 94 | 94 | |
| 95 | 95 | // Credential brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc. |
| 96 | 96 | // This category is seperate from DDoS attacks. |
| 97 | - ['brute' , '18', 'Brute-Force', true], |
|
| 97 | + [ 'brute', '18', 'Brute-Force', true ], |
|
| 98 | 98 | |
| 99 | 99 | // Webpage scraping (for email addresses, content, etc) and crawlers that do not honor robots.txt. |
| 100 | 100 | // Excessive requests and user agent spoofing can also be reported here. |
| 101 | - ['badbot' , '19', 'Bad Web Bot', true], |
|
| 101 | + [ 'badbot', '19', 'Bad Web Bot', true ], |
|
| 102 | 102 | |
| 103 | 103 | // Host is likely infected with malware and being used for other attacks or to host malicious content. |
| 104 | 104 | // The host owner may not be aware of the compromise. This category is often used in combination |
| 105 | 105 | // with other attack categories. |
| 106 | - ['explhost' , '20', 'Exploited Host', true], |
|
| 106 | + [ 'explhost', '20', 'Exploited Host', true ], |
|
| 107 | 107 | |
| 108 | 108 | // Attempts to probe for or exploit installed web applications such as a CMS |
| 109 | 109 | // like WordPress/Drupal, e-commerce solutions, forum software, phpMyAdmin and |
| 110 | 110 | // various other software plugins/solutions. |
| 111 | - ['webattack' , '21', 'Web App Attack', true ], |
|
| 111 | + [ 'webattack', '21', 'Web App Attack', true ], |
|
| 112 | 112 | |
| 113 | 113 | // Secure Shell (SSH) abuse. Use this category in combination |
| 114 | 114 | // with more specific categories. |
| 115 | - ['ssh' , '22', 'SSH', false], |
|
| 115 | + [ 'ssh', '22', 'SSH', false ], |
|
| 116 | 116 | |
| 117 | 117 | // Abuse was targeted at an "Internet of Things" type device. Include |
| 118 | 118 | // information about what type of device was targeted in the comments. |
| 119 | - ['oit' , '23', 'IoT Targeted', true], |
|
| 119 | + [ 'oit', '23', 'IoT Targeted', true ], |
|
| 120 | 120 | ]; |
| 121 | 121 | |
| 122 | 122 | /** |
@@ -129,8 +129,8 @@ discard block |
||
| 129 | 129 | */ |
| 130 | 130 | public function getCategoryIdbyName(string $categoryName) |
| 131 | 131 | { |
| 132 | - foreach ($this->aipdbApiCategories as $cat){ |
|
| 133 | - if ($cat[0] === $categoryName) { |
|
| 132 | + foreach ($this->aipdbApiCategories as $cat) { |
|
| 133 | + if ($cat[ 0 ] === $categoryName) { |
|
| 134 | 134 | return $cat; |
| 135 | 135 | } |
| 136 | 136 | } |
@@ -149,8 +149,8 @@ discard block |
||
| 149 | 149 | */ |
| 150 | 150 | public function getCategoryNameById(string $categoryId) |
| 151 | 151 | { |
| 152 | - foreach ($this->aipdbApiCategories as $cat){ |
|
| 153 | - if ($cat[1] === $categoryId) { |
|
| 152 | + foreach ($this->aipdbApiCategories as $cat) { |
|
| 153 | + if ($cat[ 1 ] === $categoryId) { |
|
| 154 | 154 | return $cat; |
| 155 | 155 | } |
| 156 | 156 | } |
@@ -171,11 +171,11 @@ discard block |
||
| 171 | 171 | protected function getCategoryIndex(string $value, int $index) |
| 172 | 172 | { |
| 173 | 173 | $i = -1; |
| 174 | - foreach ($this->aipdbApiCategories as $cat){ |
|
| 174 | + foreach ($this->aipdbApiCategories as $cat) { |
|
| 175 | 175 | |
| 176 | 176 | $i++; |
| 177 | 177 | |
| 178 | - if ($cat[$index] === $value) { |
|
| 178 | + if ($cat[ $index ] === $value) { |
|
| 179 | 179 | return $i; |
| 180 | 180 | } |
| 181 | 181 | } |