I don't recommend this script:
1. there's a critical vulnerability that can be used to bypass timer (reported in PM)
2. the way it's written is just asking for a SQL Injection vulnerability. Instead of using prepared statements or an ORM, variables are escaped in random places. I've already found an instance of variable that's escaped twice, it's not hard to imagine there is (or will be introduced in an update) a variable that's not escaped at all.
3. superglobal variables are overwritten
4. getipintel have a limit of 500 queries and will be too expensive to be used by faucets, so this bot shield is useless