request, bad login notify to ops
 

News:

29 December 2022 - PtokaX 0.5.3.0 (20th anniversary edition) released...
11 April 2017 - PtokaX 0.5.2.2 released...
8 April 2015 Anti child and anti pedo pr0n scripts are not allowed anymore on this board!
28 September 2015 - PtokaX 0.5.2.1 for Windows 10 IoT released...
3 September 2015 - PtokaX 0.5.2.1 released...
16 August 2015 - PtokaX 0.5.2.0 released...
1 August 2015 - Crowdfunding for ADC protocol support in PtokaX ended. Clearly nobody want ADC support...
30 June 2015 - PtokaX 0.5.1.0 released...
30 April 2015 Crowdfunding for ADC protocol support in PtokaX
26 April 2015 New support hub!
20 February 2015 - PtokaX 0.5.0.3 released...
13 April 2014 - PtokaX 0.5.0.2 released...
23 March 2014 - PtokaX testing version 0.5.0.1 build 454 is available.
04 March 2014 - PtokaX.org sites were temporary down because of DDOS attacks and issues with hosting service provider.

Main Menu

request, bad login notify to ops

Started by Loading, 27 June, 2005, 04:11:18

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Loading

hello ppl
i have a question can you make this script

just to detect who try to enter whinthout the min.slots ,
min. share , min. client ?

and send a pm to masters and netfounders ?

The script is this one:

   -- Unreg Alert v1

    -- By Dessamator



    function Main()

    tImmune ={}

    if io.open("immune.tbl") then dofile("immune.tbl") end

    end



    function OnExit()

    SaveToFile("immune.tbl" , tImmune , "tImmune")

    end



    function SupportsArrival(user, data)

    if not user.bRegistered and not tImmune[user.sIP] then

    SendToOps("botname",user.sName.." with "..user.sIP.." was not registered and tried to login")

    end

    end



    function ChatArrival(user,data)

    data=string.sub(data,1,-2)

    local s,e,cmd = string.find(data,"%b<>%s+(%S+)")

    local _,__,ip = string.find(data,"%b<>%s+%S+%s+(%S+)")

    if cmd =="!immune" then

    tImmune[(ip)] = 1

    user:SendData(frmHub:GetHubBotName(),"Done!, that ip has been immuned")

    return 1

    elseif cmd =="!delimmune" then

    tImmune[(ip)] = nil

    user:SendData(frmHub:GetHubBotName(),"Done!, that ip is no longer immune")

    return 1

    elseif cmd=="!showimmune" then

    local temp="\r\n\t\Immuned IPs:\r\n"..string.rep("??",12).."\r\n"

    for i,v in tImmune do

    temp=temp.."\t•"..i.."\r\n"

    end

    user:SendData(frmHub:GetHubBotName(),temp)

    return 1

    end

    end





    function Serialize(tTable, sTableName, sTab)

    assert(tTable, "tTable equals nil");

    assert(sTableName, "sTableName equals nil");



    assert(type(tTable) == "table", "tTable must be a table!");

    assert(type(sTableName) == "string", "sTableName must be a string!");



    sTab = sTab or "";

    sTmp = ""



    sTmp = sTmp..sTab..sTableName.." = {\n"



    for key, value in tTable do

    local sKey = (type(key) == "string") and string.format("[%q]",key) or string.format("[%d]",key);



    if(type(value) == "table") then

    sTmp = sTmp..Serialize(value, sKey, sTab.."\t");

    else

    local sValue = (type(value) == "string") and string.format("%q",value) or tostring(value);

    sTmp = sTmp..sTab.."\t"..sKey.." = "..sValue

    end



    sTmp = sTmp..",\n"

    end



    sTmp = sTmp..sTab.."}"

    return sTmp

    end



    function SaveToFile(file , table , tablename)

    local handle = io.open(file,"w+")

    handle:write(Serialize(table, tablename))

    handle:flush()

    handle:close()

    end

can anyone help me ?

best regards

Loading

Loading

can anyone give a help here ?

please ?


best regards

Loading

can anyone make this script for me ?

or chage this one please ?



best regards


Loading

SMF spam blocked by CleanTalk