mirror of
https://github.com/kristuff/abuseipdb
synced 2025-08-21 14:03:12 -07:00
initial commit
This commit is contained in:
commit
78ed771bcb
7 changed files with 534 additions and 0 deletions
123
lib/ApiDefintion.php
Normal file
123
lib/ApiDefintion.php
Normal file
|
@ -0,0 +1,123 @@
|
|||
<?php
|
||||
|
||||
/**
|
||||
* _ _ ___ ____ ____ ____
|
||||
* / \ | |__ _ _ ___ ___|_ _| _ \| _ \| __ )
|
||||
* / _ \ | '_ \| | | / __|/ _ \| || |_) | | | | _ \
|
||||
* / ___ \| |_) | |_| \__ \ __/| || __/| |_| | |_) |
|
||||
* /_/ \_\_.__/ \__,_|___/\___|___|_| |____/|____/
|
||||
*
|
||||
* This file is part of Kristuff\AbsuseIPDB.
|
||||
*
|
||||
* (c) Kristuff <contact@kristuff.fr>
|
||||
*
|
||||
* For the full copyright and license information, please view the LICENSE
|
||||
* file that was distributed with this source code.
|
||||
*
|
||||
* @version 0.1.0
|
||||
* @copyright 2020 Kristuff
|
||||
*/
|
||||
|
||||
namespace Kristuff\AbuseIPDB;
|
||||
|
||||
/**
|
||||
* Class ApiDefintion
|
||||
*
|
||||
* Abstract base class for ApiManager
|
||||
* Contains main hard coded api settings
|
||||
*/
|
||||
abstract class ApiDefintion
|
||||
{
|
||||
/**
|
||||
* AbuseIPDB API v2 Endpoint
|
||||
* @var string $api_endpoint
|
||||
*/
|
||||
protected $aipdbApiEndpoint = 'https://api.abuseipdb.com/api/v2/';
|
||||
|
||||
/**
|
||||
* AbuseIPDB API v2 categories
|
||||
* @var array $aipdbApiCategories
|
||||
*/
|
||||
protected $aipdbApiCategories = [
|
||||
|
||||
// Altering DNS records resulting in improper redirection.
|
||||
'dns-c' => ['1', 'DNS Compromise', true],
|
||||
|
||||
// Falsifying domain server cache (cache poisoning).
|
||||
'dns-p' => ['2', 'DNS Poisoning', true],
|
||||
|
||||
// Fraudulent orders.
|
||||
'fraud-orders' => ['3', 'Fraud Orders', true],
|
||||
|
||||
// Participating in distributed denial-of-service (usually part of botnet).
|
||||
'ddos' => ['4', 'DDoS Attack', true],
|
||||
|
||||
//
|
||||
'ftp-bf' => ['5', 'FTP Brute-Force', true],
|
||||
|
||||
// Oversized IP packet.
|
||||
'pingdeath' => ['6', 'Ping of Death', true],
|
||||
|
||||
// Phishing websites and/or email.
|
||||
'phishing' => ['7', 'Phishing', true],
|
||||
|
||||
//
|
||||
'fraudvoip' => ['8', 'Fraud VoIP', true],
|
||||
|
||||
// Open proxy, open relay, or Tor exit node.
|
||||
'openproxy' => ['9', 'Open Proxy', true],
|
||||
|
||||
// Comment/forum spam, HTTP referer spam, or other CMS spam.
|
||||
'webspam' => ['10', 'Web Spam', true],
|
||||
|
||||
// Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent
|
||||
// information (instead of log dumps) and be sure to remove PII if you want to remain anonymous.
|
||||
'emailspam' => ['11', 'Email Spam', true],
|
||||
|
||||
// CMS blog comment spam.
|
||||
'blogspam' => ['12', 'Blog Spam', true],
|
||||
|
||||
// Conjunctive category.
|
||||
'vpnip' => ['13', 'VPN IP', false], // to check alone ??
|
||||
|
||||
// Scanning for open ports and vulnerable services.
|
||||
'scan' => ['14', 'Port Scan', true],
|
||||
|
||||
// seems to can't be used alone
|
||||
'hack' => ['15', 'Hacking', false],
|
||||
|
||||
// Attempts at SQL injection.
|
||||
'sql' => ['16', 'SQL Injection'], true,
|
||||
|
||||
// Email sender spoofing.
|
||||
'spoof' => ['17', 'Spoofing', true],
|
||||
|
||||
// Credential brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc.
|
||||
// This category is seperate from DDoS attacks.
|
||||
'brute' => ['18', 'Brute-Force', true],
|
||||
|
||||
// Webpage scraping (for email addresses, content, etc) and crawlers that do not honor robots.txt.
|
||||
// Excessive requests and user agent spoofing can also be reported here.
|
||||
'badbot' => ['19', 'Bad Web Bot', true],
|
||||
|
||||
|
||||
// Host is likely infected with malware and being used for other attacks or to host malicious content.
|
||||
// The host owner may not be aware of the compromise. This category is often used in combination
|
||||
// with other attack categories.
|
||||
'explhost' => ['20', 'Exploited Host', true],
|
||||
|
||||
// Attempts to probe for or exploit installed web applications such as a CMS
|
||||
// like WordPress/Drupal, e-commerce solutions, forum software, phpMyAdmin and
|
||||
// various other software plugins/solutions.
|
||||
'webattack' => ['21', 'Web App Attack', true ],
|
||||
|
||||
// Secure Shell (SSH) abuse. Use this category in combination
|
||||
// with more specific categories.
|
||||
'ssh' => ['22', 'SSH', false],
|
||||
|
||||
// Abuse was targeted at an "Internet of Things" type device. Include
|
||||
// information about what type of device was targeted in the comments.
|
||||
'oit' => ['23', 'IoT Targeted', true],
|
||||
];
|
||||
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue