added info about what open proxy was found in akill message
This commit is contained in:
parent
585c4745d4
commit
566d2bbcc3
2 changed files with 3 additions and 2 deletions
|
@ -7,6 +7,7 @@ Open Proxy Scanning Bot Module for NeoStats Changelog.
|
|||
- added REMOVE function to help remove akills set by OPSB
|
||||
- Bah, really fixed set to not work at all!
|
||||
- Added some stats on cachehits and opm hits
|
||||
- Added details about what open proxy was found
|
||||
|
||||
* Version 1.0RC3 * 5/11/2002 * Fish
|
||||
- Fixed a problem when we delete a scanned user out of the active list when the tcp connect had finished, but not the dns bl lookup...
|
||||
|
|
4
proxy.c
4
proxy.c
|
@ -20,7 +20,7 @@
|
|||
** USA
|
||||
**
|
||||
** NeoStats CVS Identification
|
||||
** $Id: proxy.c,v 1.12 2003/01/30 11:29:25 fishwaldo Exp $
|
||||
** $Id: proxy.c,v 1.13 2003/02/14 13:24:32 fishwaldo Exp $
|
||||
*/
|
||||
|
||||
|
||||
|
@ -89,7 +89,7 @@ void do_ban(scaninfo *scandata) {
|
|||
chanalert(s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
|
||||
globops(s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
|
||||
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "Banning %s (%s) for Open Proxy - %s(%d)", scandata->who, inet_ntoa(scandata->ipaddr), proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
|
||||
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Open Proxy found on your host. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
|
||||
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Open Proxy found on your host. %s(%s) Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", proxy_list[sockdata->type].type, proxy_list[sockdata->type].port, inet_ntoa(scandata->ipaddr));
|
||||
if ((fp = fopen("logs/opsb.log", "a")) == NULL) return;
|
||||
fprintf(fp, "%s:%s:%s\n", proxy_list[sockdata->type].type, inet_ntoa(scandata->ipaddr), scandata->connectstring);
|
||||
fclose(fp);
|
||||
|
|
Reference in a new issue