From 9981a2991d9a66abe77b0f8728179a8bb5a203ba Mon Sep 17 00:00:00 2001 From: Sefinek Date: Thu, 10 Oct 2024 07:18:58 +0200 Subject: [PATCH] SUCCESS_COOLDOWN=500 --- .env.default | 6 +++--- config.js | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/.env.default b/.env.default index c9d2d9a..25c8580 100644 --- a/.env.default +++ b/.env.default @@ -19,14 +19,14 @@ CYCLE_INTERVAL=120 # The minimum time (in hours) that must pass after reporting an IP address before it can be reported again. # The required time is >= 15 minutes, according to AbuseIPDB API limits. -REPORTED_IP_COOLDOWN_MS=6 +REPORTED_IP_COOLDOWN_MS=7 # The maximum URI length that can be reported to AbuseIPDB. # If Cloudflare returns a longer URI, the API request will fail. MAX_URL_LENGTH=920 -# Additional delay (in seconds) after each successful IP report to avoid overloading the AbuseIPDB API. -SUCCESS_COOLDOWN=1 +# Additional delay (in miliseconds) after each successful IP report to avoid overloading the AbuseIPDB API. +SUCCESS_COOLDOWN=500 # Interval for refreshing your IP address (in minutes). # This ensures that WAF violations originating from your IP address are not reported to AbuseIPDB. diff --git a/config.js b/config.js index c29acc2..a3d2ccc 100644 --- a/config.js +++ b/config.js @@ -5,7 +5,7 @@ const REPORTED_IP_COOLDOWN_MS = parseInt(process.env.REPORTED_IP_COOLDOWN_MS || const MAX_URL_LENGTH = parseInt(process.env.MAX_URL_LENGTH || '920'); -const SUCCESS_COOLDOWN = parseInt(process.env.SUCCESS_COOLDOWN || '2') * 1000; +const SUCCESS_COOLDOWN = parseInt(process.env.SUCCESS_COOLDOWN || '1000'); const IP_REFRESH_INTERVAL = parseInt(process.env.IP_REFRESH_INTERVAL || '80') * 60 * 1000;