Linux premium99.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
 LiteSpeed
 198.54.125.67 | Your IP: 216.73.216.91
 Cant read [ /etc/named.conf ]
 [ drwxr-xr-x ]
/ opt / imunify360 / venv / lib / python3.11 / site-packages / imav / malwarelib / rpc / schema /


Operating System : Linux premium99.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
User / Group : 915[girlrufr] / 913[girlrufr]
PHP Version : 8.1.33
IP Server : 198.54.125.67
Your IP : 216.73.216.91
Storage : Total = 48.91 GB, Free = 33.36 GB [68%]
Domains : Cant read [ /etc/named.conf ]
Software : LiteSpeed
Disable Functions : All function is accessible
Useful Functions : gcc, lcc, cc, ld, make, php, perl, python, ruby, tar, gzip, bzip, bzialfa2, nc, locate, suidperl, git, docker, ssh
Downloader : wget, fetch, lynx, links, curl, get, lwp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF
Safe Mode : OFF | Open Basedir : NONE | Safe Mode Exec Dir : NONE | Safe Mode Include Dir : NONE
Name Type Size Owner/Group Permission Last Modified Actions
. dir - root/root drwxr-xr-x 2025-11-11 11:42:24
.. dir - root/root drwxr-xr-x 2025-11-11 11:42:24
history.pickle application/octet-stream 1.05 KB root/root -rw-r--r-- 2025-11-05 01:43:55
history.yaml text/plain 1.17 KB root/root -rw-r--r-- 2025-11-05 01:22:34
ignore.pickle application/octet-stream 2.41 KB root/root -rw-r--r-- 2025-11-05 01:43:55
ignore.yaml text/plain 2.74 KB root/root -rw-r--r-- 2025-11-05 01:22:34
imunify-patch-subscriptions.pickle application/octet-stream 177 B root/root -rw-r--r-- 2025-11-05 01:43:55
imunify-patch-subscriptions.yaml text/plain 159 B root/root -rw-r--r-- 2025-11-05 01:22:34
malicious.pickle application/octet-stream 5.26 KB root/root -rw-r--r-- 2025-11-05 01:43:55
malicious.yaml text/plain 6.53 KB root/root -rw-r--r-- 2025-11-05 01:22:34
malware-rebuild-patterns.pickle application/octet-stream 270 B root/root -rw-r--r-- 2025-11-05 01:43:55
malware-rebuild-patterns.yaml text/plain 261 B root/root -rw-r--r-- 2025-11-05 01:22:34
malware-rescan-files.pickle application/octet-stream 183 B root/root -rw-r--r-- 2025-11-05 01:43:55
malware-rescan-files.yaml text/plain 181 B root/root -rw-r--r-- 2025-11-05 01:22:34
malware-send-files.pickle application/octet-stream 236 B root/root -rw-r--r-- 2025-11-05 01:43:55
malware-send-files.yaml text/plain 244 B root/root -rw-r--r-- 2025-11-05 01:22:34
on-demand-queue.pickle application/octet-stream 2.2 KB root/root -rw-r--r-- 2025-11-05 01:43:55
on-demand-queue.yaml text/plain 2.57 KB root/root -rw-r--r-- 2025-11-05 01:22:34
on-demand-user.pickle application/octet-stream 1.49 KB root/root -rw-r--r-- 2025-11-05 01:43:55
on-demand-user.yaml text/plain 1.59 KB root/root -rw-r--r-- 2025-11-05 01:22:34
on-demand.pickle application/octet-stream 3.14 KB root/root -rw-r--r-- 2025-11-05 01:43:55
on-demand.yaml text/plain 3.56 KB root/root -rw-r--r-- 2025-11-05 01:22:34
read.pickle application/octet-stream 482 B root/root -rw-r--r-- 2025-11-05 01:43:55
read.yaml text/plain 526 B root/root -rw-r--r-- 2025-11-05 01:22:34
submit.pickle application/octet-stream 802 B root/root -rw-r--r-- 2025-11-05 01:43:55
submit.yaml text/plain 915 B root/root -rw-r--r-- 2025-11-05 01:22:34
user.pickle application/octet-stream 1.7 KB root/root -rw-r--r-- 2025-11-05 01:43:55
user.yaml text/plain 1.93 KB root/root -rw-r--r-- 2025-11-05 01:22:34
vulnerabilities.pickle application/octet-stream 2.71 KB root/root -rw-r--r-- 2025-11-05 01:43:55
vulnerabilities.yaml text/plain 3.09 KB root/root -rw-r--r-- 2025-11-05 01:22:34
© SEC