Linux premium117.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
 LiteSpeed
 162.0.229.114 | Your IP: 216.73.216.60
 Cant read [ /etc/named.conf ]
 [ drwxr-xr-x ]
/ opt / imunify360 / venv / lib / python3.11 / site-packages / imav / malwarelib / rpc / schema /


Operating System : Linux premium117.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
User / Group : 539[sawaunyk] / 539[sawaunyk]
PHP Version : 8.1.34
IP Server : 162.0.229.114
Your IP : 216.73.216.60
Storage : Total = 48.91 GB, Free = 31.66 GB [64%]
Domains : Cant read [ /etc/named.conf ]
Software : LiteSpeed
Disable Functions : All function is accessible
Useful Functions : gcc, lcc, cc, ld, make, php, perl, python, ruby, tar, gzip, bzip, bzialfa2, nc, locate, suidperl, git, docker, ssh
Downloader : wget, fetch, lynx, links, curl, get, lwp-mirror
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF
Safe Mode : OFF | Open Basedir : NONE | Safe Mode Exec Dir : NONE | Safe Mode Include Dir : NONE
Name Type Size Owner/Group Permission Last Modified Actions
. dir - root/root drwxr-xr-x 2026-03-03 08:47:27
.. dir - root/root drwxr-xr-x 2026-03-03 08:47:27
history.pickle application/octet-stream 1.05 KB root/root -rw-r--r-- 2026-01-23 02:05:10
history.yaml text/plain 1.17 KB root/root -rw-r--r-- 2026-01-23 01:31:43
ignore.pickle application/octet-stream 2.41 KB root/root -rw-r--r-- 2026-01-23 02:05:10
ignore.yaml text/plain 2.74 KB root/root -rw-r--r-- 2026-01-23 01:31:43
imunify-patch-subscriptions.pickle application/octet-stream 177 B root/root -rw-r--r-- 2026-01-23 02:05:10
imunify-patch-subscriptions.yaml text/plain 159 B root/root -rw-r--r-- 2026-01-23 01:31:43
malicious.pickle application/octet-stream 5.26 KB root/root -rw-r--r-- 2026-01-23 02:05:10
malicious.yaml text/plain 6.53 KB root/root -rw-r--r-- 2026-01-23 01:31:43
malware-rebuild-patterns.pickle application/octet-stream 270 B root/root -rw-r--r-- 2026-01-23 02:05:10
malware-rebuild-patterns.yaml text/plain 261 B root/root -rw-r--r-- 2026-01-23 01:31:43
malware-rescan-files.pickle application/octet-stream 183 B root/root -rw-r--r-- 2026-01-23 02:05:10
malware-rescan-files.yaml text/plain 181 B root/root -rw-r--r-- 2026-01-23 01:31:43
malware-send-files.pickle application/octet-stream 236 B root/root -rw-r--r-- 2026-01-23 02:05:10
malware-send-files.yaml text/plain 244 B root/root -rw-r--r-- 2026-01-23 01:31:43
on-demand-queue.pickle application/octet-stream 2.2 KB root/root -rw-r--r-- 2026-01-23 02:05:10
on-demand-queue.yaml text/plain 2.57 KB root/root -rw-r--r-- 2026-01-23 01:31:43
on-demand-user.pickle application/octet-stream 1.49 KB root/root -rw-r--r-- 2026-01-23 02:05:10
on-demand-user.yaml text/plain 1.59 KB root/root -rw-r--r-- 2026-01-23 01:31:43
on-demand.pickle application/octet-stream 3.14 KB root/root -rw-r--r-- 2026-01-23 02:05:10
on-demand.yaml text/plain 3.56 KB root/root -rw-r--r-- 2026-01-23 01:31:43
read.pickle application/octet-stream 482 B root/root -rw-r--r-- 2026-01-23 02:05:10
read.yaml text/plain 526 B root/root -rw-r--r-- 2026-01-23 01:31:43
submit.pickle application/octet-stream 802 B root/root -rw-r--r-- 2026-01-23 02:05:10
submit.yaml text/plain 915 B root/root -rw-r--r-- 2026-01-23 01:31:43
user.pickle application/octet-stream 1.7 KB root/root -rw-r--r-- 2026-01-23 02:05:10
user.yaml text/plain 1.93 KB root/root -rw-r--r-- 2026-01-23 01:31:43
vulnerabilities.pickle application/octet-stream 2.71 KB root/root -rw-r--r-- 2026-01-23 02:05:10
vulnerabilities.yaml text/plain 3.09 KB root/root -rw-r--r-- 2026-01-23 01:31:43
© SEC