/plugin/iptrust/ |
H A D | admin.php | 43 $ip = long2ip(ip2long($_REQUEST['ip'])); 46 if (in_array($ip."\n", $ips)) { 61 (ip2long($ip) !== false)) { 62 $ip = long2ip(ip2long($ip)); 82 (ip2long($ip) !== false)) { 83 $ip = long2ip(ip2long($ip)); 85 if (in_array($ip."\n", $ips)) { 124 foreach ($ips as $ip) { 125 $ip = rtrim($ip); 127 ptln("<td>".rtrim($ip)."</td>"); [all …]
|
H A D | action.php | 43 $ip = clientIP(true); 45 if (!$ips || !in_array($ip."\n", $ips)) { 53 $ip = clientIP(true); 55 if (!$ips || !in_array($ip."\n", $ips)) { 58 if (strpos($ip, $net) === 0) { 64 if ($ip == $host) { 71 $logins[$i] = $_SERVER['REMOTE_USER']."\t".$ip."\t".time()."\n";
|
/plugin/iptrust2/ |
H A D | admin.php | 31 $ip = long2ip(ip2long($_REQUEST['ip'])); 34 if (in_array($ip."\n", $ips)) { 49 (ip2long($ip) !== false)) { 50 $ip = long2ip(ip2long($ip)); 70 (ip2long($ip) !== false)) { 71 $ip = long2ip(ip2long($ip)); 73 if (in_array($ip."\n", $ips)) { 112 foreach ($ips as $ip) { 113 $ip = rtrim($ip); 115 ptln("<td>".rtrim($ip)."</td>"); [all …]
|
H A D | action.php | 35 $ip = clientIP(true); 50 $ip = clientIP(true); 52 if (!$ips || !in_array($ip."\n", $ips)) { 68 $ip = clientIP(true); 70 if (!$ips || !in_array($ip."\n", $ips)) { 73 if (strpos($ip, $net) === 0) { 79 if ($ip == $host) { 86 $logins[$i] = $_SERVER['REMOTE_USER']."\t".$ip."\t".time()."\n";
|
/plugin/quickstats/db/ |
H A D | dataBaseStructure.txt | 1 ip.ser
32 [ip] => Array
34 [<ip>] => [<count>]
46 [ip] => Array
48 [<ip>] => [<count>]
63 [<ip>] => Array (<val>, <val>, . .), /* value is only saved once , i.e value_1, no matter how many times it occurs */
64 [<ip>] => Array (<val>, <val>, . .),
66 [<ip>] => <n> /* number of instances where a value occurs, so value_1 shows up here as occuring <n> times */
67 [<ip] => <n>
84 [<ip>] [all...] |
/plugin/tokenbucketauth/ |
H A D | admin.php | 52 $ip = array_shift(array_keys($_REQUEST['delip'])); 91 if(isset($blocked[$ip])) 94 unset($blocked[$ip]); 112 if(isset($users_tracker[$ip])) 113 unset($users_tracker[$ip]); 151 foreach($bans as $ip => $block_timestamp) 156 $new_bans[$ip] = $block_timestamp; 174 foreach($bans as $ip => $block_timestamp) 176 $host = @gethostbyaddr($ip); 177 if($host === false || $host === $ip) [all …]
|
H A D | action.php | 92 $ip = $_SERVER['REMOTE_ADDR']; 103 if(array_key_exists($ip, $this->blocked)) 108 $this->_do_disable_login($ip, $this->blocked[$ip]); 115 unset($this->blocked[$ip]); 119 $ts = $this->users_tracker[$ip]; 146 $this->users_tracker[$ip] = $ts; 161 if(array_key_exists($ip, $this->blocked)) 162 $this->_do_disable_login($ip, $this->blocked[$ip], true); 177 $ip = $_SERVER['REMOTE_ADDR']; 181 if(empty($this->users_tracker[$ip])) [all …]
|
/plugin/abc2/abc-libraries/abc2svg/ |
H A D | snd-1.js | 485 throw new Error('chunk not found');this.parseRiffChunk(chunk);this.input=null};sf2.Parser.prototype.parseRiffChunk=function(chunk){var parser,data=this.input,ip=chunk.offset,signature;if(chunk.type!=='RIFF') 486 throw new Error('invalid chunk type:'+chunk.type);signature=String.fromCharCode(data[ip++],data[ip++],data[ip++],data[ip++]);if(signature!=='sfbk') 487 throw new Error('invalid signature:'+signature);parser=new sf2.Riff.Parser(data,{'index':ip,'length':chunk.size-4});parser.parse();if(parser.getNumberOfChunks()!==3) 488 throw new Error('invalid sfbk structure');this.parseInfoList(parser.getChunk(0));this.parseSdtaList(parser.getChunk(1));this.parsePdtaList(parser.getChunk(2))};sf2.Parser.prototype.parseInfoList=function(chunk){var parser,data=this.input,ip=chunk.offset,signature;if(chunk.type!=='LIST') 489 throw new Error('invalid chunk type:'+chunk.type);signature=String.fromCharCode(data[ip++],data[ip++],data[ip [all...] |
/plugin/pureldap/vendor/freedsx/socket/src/FreeDSx/Socket/ |
H A D | SocketServer.php | 73 * @param string $ip 77 * @internal param string $ip 79 public function listen(string $ip, ?int $port): self 95 $uri = $transport.'://'.$ip; 177 * @param string $ip 184 string $ip, 189 $ip, 197 * @param string $ip 204 string $ip, 209 $ip, 56 listen(string $ip, int $port) global() argument 140 bind(string $ip, int $port, array $options = []) global() argument 154 bindTcp(string $ip, int $port, array $options = []) global() argument 168 bindUdp(string $ip, int $port, array $options = []) global() argument [all...] |
/plugin/badbehaviour/bad-behavior/ |
H A D | blackhole.inc.php | 35 $ip = $package['ip']; 36 $find = implode('.', array_reverse(explode('.', $ip))); 62 $ip = explode('.', $result[0]); 64 …if ($ip[0] == 127 && ($ip[3] & 7) && $ip[2] >= $settings['httpbl_threat'] && $ip[1] <= $settings['… 68 if ($ip[3] == 0) {
|
/plugin/smtp/ |
H A D | helper.php | 22 $ip = $_SERVER["SERVER_ADDR"]; 23 if (empty($ip)) 27 $colonPos = strpos($ip, ':'); 29 $ip = 'IPv6:'.$ip; 32 return "[" . $ip . "]";
|
/plugin/abortlogin/ |
H A D | action.php | 24 $ip = $_SERVER['REMOTE_ADDR']; 29 …sabled file from the plugin directory when you are finished setting up. Your current IP is $ip",2); 49 …&& empty($_REQUEST['http_credentials']) && !empty($USERINFO) && !$this->is_allowed($allowed, $ip)){ 66 if($ACT == 'login' && !$this->is_allowed($allowed, $ip)) { 68 $this->log($ip); 76 function is_allowed($allowed, $ip) { argument 90 if( preg_match("/" . $allowed . "/", $ip) ) { 96 function log($ip) { argument 98 io_saveFile($log,"$ip\n",1);
|
/plugin/stopforumspam2/ |
H A D | helper.php | 23 function rawdata($ip = null, $email = null, $username = null, $wildcards = null){ argument 25 if ($ip == null and $email == null and $username == null) return array(); 30 'ip' => $ip, 76 …if (isset($resultarray['ip']['frequency'])) $ipfreq = $resultarray['ip']['frequency']; else $ipfre… 79 …if (isset($resultarray['ip']['confidence'])) $ipconf = $resultarray['ip']['confidence']; else $ipc… 83 … if ($returnvalue) return array('ip' => $ipfreq, 'email' => $emailfreq, 'username' => $namefreq); 124 …if (isset($resultarray['ip']['confidence'])) $ipconf = $resultarray['ip']['confidence']; else $ipc… 127 …if (isset($resultarray['ip']['frequency'])) $ipfreq = $resultarray['ip']['frequency']; else $ipfre… 212 * @param string $ip 217 function whitelists ($ip = null, $email = null, $username = null) { argument [all …]
|
/plugin/quickstats/scripts/ |
H A D | extended_data.php | 50 case 'ip': 51 if(isset($_POST['ip']) && $_POST['ip']) { 86 function ip_data($ip=false,$p_brief=false) { argument 90 if($ip === false) $ip =rawurldecode($_POST['ip']); 94 $result = ip_row(array('ip','ua'), $ip,$date); 96 $table .= '<tr>' . cell("$ip ",'captio 128 qs_data(& $ar, $ip) global() argument 262 get_page_row($ip, $date, $p_brief = false, $agent = false) global() argument [all...] |
/plugin/yourip/ |
H A D | syntax.php | 55 $ip = getenv ("REMOTE_ADDR"); 57 if (substr_count($ip,":") > 1 && substr_count($ip,".") == 0) 69 $text .= sprintf( $this->getLang('ipv6_from'), $ip); // "IPv6 connection from $ip" 75 $text .= sprintf( $this->getLang('ipv4_from'), $ip); // "IPv4 connection from $ip" 85 $text .= sprintf( $this->getLang('ipv6_from'), $ip); // "IPv6 connection from $ip" 87 $text .= sprintf( $this->getLang('ipv4_from'), $ip); // "IPv4 connection from $ip" 95 $text .= "$ip" ;
|
/plugin/quickstats/ |
H A D | action.php | 53 $ip = $_SERVER['REMOTE_ADDR']; 54 //$ip = "2001:982:acd6:1:4899:d135:226b:2e79"; 55 //$ip = "2602:304:cec0:9b00:e96b:9c78:eb14:9fb"; 56 // $ip = "76.24.190.253"; 57 if($this->is_excluded($ip, true)){ 61 $ipv6 = isValidIPv6($ip); 66 else $this->ipaddr = $ip; 73 $this->ip_file = metaFN($ns . 'ip' , '.ser'); 114 $ip ="2001:982:acd6:1:4899:d135:226b:2e79"; 115 $record = $reader->city($ip); 333 is_excluded($ip, $abort = false) global() argument 538 get_country($ip = null) global() argument [all...] |
/plugin/stopforumspam/ |
H A D | ResponseChecker.php | 25 public $ip; variable in Response 27 public function __construct($username = null, $email = null, $ip = null) argument 35 if ($ip == null) { 36 $ip = new ResponseCategory(); 41 $this->ip = $ip; 57 $this->ip = $this->ResponseCategoryFromAssoc($response['ip']); 116 } else if (($result = $this->categoryIsValid($response->ip)) === false) {
|
H A D | action.php | 40 private function do_check($username, $email, $ip) argument 43 urlencode($email), urlencode($username), urlencode($ip)); 55 $ip = $_SERVER['REMOTE_ADDR']; 56 $response = $this->do_check($username, $email, $ip); 62 $this->logger->LogAttempt($username, $email, $ip, $this->checker->trigger,
|
/plugin/authgooglesheets/vendor/google/apiclient-services/src/ServiceControl/ |
H A D | Peer.php | 25 public $ip; variable in Google\\Service\\ServiceControl\\Peer 46 public function setIp($ip) argument 48 $this->ip = $ip; 55 return $this->ip;
|
/plugin/authgooglesheets/vendor/monolog/monolog/src/Monolog/Handler/SyslogUdp/ |
H A D | UdpSocket.php | 22 protected $ip; variable in Monolog\\Handler\\SyslogUdp\\UdpSocket 28 public function __construct(string $ip, int $port = 514) argument 30 $this->ip = $ip; 63 …throw new \RuntimeException('The UdpSocket to '.$this->ip.':'.$this->port.' has been closed and ca… 65 socket_sendto($this->socket, $chunk, strlen($chunk), $flags = 0, $this->ip, $this->port);
|
/plugin/quickstats/scripts/php-inet6_1.0.2/ |
H A D | valid_v6.php | 15 * @param string $ip
18 function isValidIPv6($ip)
argument 20 if ( false === filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) )
24 return inet6_compress($ip);
|
/plugin/snmplive/ |
H A D | script.js | 10 function plugin_snmplive(ip,oid){ argument 11 var snmpId = ip + oid; 36 window.setTimeout("plugin_snmplive('"+ip+"','"+oid+"')",1000); 39 ajax.runAJAX('SNMPip='+encodeURI(ip)+'&SNMPoid='+encodeURI(oid));
|
/plugin/authucenter/lib/uc_client/model/ |
H A D | misc.php | 52 function test_api($url, $ip = '') { argument 55 …function dfopen2($url, $limit = 0, $post = '', $cookie = '', $bysocket = FALSE, $ip = '', $timeout… argument 61 return $this->dfopen($url, $limit, $post, $cookie, $bysocket, $ip, $timeout, $block, $encodetype); 64 …function dfopen($url, $limit = 0, $post = '', $cookie = '', $bysocket = FALSE , $ip = '', $timeout… argument 97 if(!$fp = @fsocketopen(($ip ? $ip : $host), $port, $errno, $errstr, $timeout)) { 107 $fp = @fopen($scheme.'://'.($ip ? $ip : $host).':'.$port.$path, 'b', false, $context);
|
H A D | domain.php | 26 function add_domain($domain, $ip) { argument 28 $this->db->query("INSERT INTO ".UC_DBTABLEPRE."domains SET domain='$domain', ip='$ip'"); 50 function update_domain($domain, $ip, $id) { argument 51 $this->db->query("UPDATE ".UC_DBTABLEPRE."domains SET domain='$domain', ip='$ip' WHERE id='$id'");
|
/plugin/ipban/_test/ |
H A D | check.test.php | 43 * @param string $ip 47 public function test_banning($ip, $result) argument 53 (bool) $this->callInaccessibleMethod($action,'isBanned', [$ip, $this->banconfig])
|