===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
go-mmproxy-2.0/proxyprotocol.go-117-
go-mmproxy-2.0/proxyprotocol.go:118:func PROXYReadRemoteAddr(buf []byte, protocol Protocol) (net.Addr, net.Addr, []byte, error) {
go-mmproxy-2.0/proxyprotocol.go-119-	if len(buf) >= 16 && bytes.Equal(buf[:12],
##############################################
go-mmproxy-2.0/tcp.go-21-	defer conn.Close()
go-mmproxy-2.0/tcp.go:22:	logger = logger.With(zap.String("remoteAddr", conn.RemoteAddr().String()),
go-mmproxy-2.0/tcp.go:23:		zap.String("localAddr", conn.LocalAddr().String()))
go-mmproxy-2.0/tcp.go-24-
go-mmproxy-2.0/tcp.go:25:	if !CheckOriginAllowed(conn.RemoteAddr().(*net.TCPAddr).IP) {
go-mmproxy-2.0/tcp.go-26-		logger.Debug("connection origin not in allowed subnets", zap.Bool("dropConnection", true))
##############################################
go-mmproxy-2.0/tcp.go-46-
go-mmproxy-2.0/tcp.go:47:	saddr, _, restBytes, err := PROXYReadRemoteAddr(buffer[:n], TCP)
go-mmproxy-2.0/tcp.go-48-	if err != nil {
##############################################
go-mmproxy-2.0/udp.go-160-
go-mmproxy-2.0/udp.go:161:		saddr, _, restBytes, err := PROXYReadRemoteAddr(buffer[:n], UDP)
go-mmproxy-2.0/udp.go-162-		if err != nil {