File manager - Edit - /home/kdmucyyv/stayandbuy.co.ke/.htaccess
Back
### Added by Truehost Safety Team ### # Enforce HTTPS RewriteEngine On RewriteCond %{HTTPS} off RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301] # Block consistently compromised paths RewriteRule ^(arg|22)(/.*)?$ - [F,L] # BEGIN WordPress # The directives (lines) between "BEGIN WordPress" and "END WordPress" are # dynamically generated, and should only be modified via WordPress filters. # Any changes to the directives between these markers will be overwritten. <IfModule mod_rewrite.c> RewriteEngine On RewriteRule .* - [E=HTTP_AUTHORIZATION:%{HTTP:Authorization}] RewriteBase / RewriteRule ^index\.php$ - [L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] </IfModule> # END WordPress # Disable directory browsing Options -Indexes # Protect .htaccess and other sensitive files <FilesMatch "^\."> Order allow,deny Deny from all </FilesMatch> # Block access to wp-config.php <Files wp-config.php> Order allow,deny Deny from all </Files> # Prevent PHP execution in uploads <Directory "/wp-content/uploads/"> <FilesMatch "\.php$"> Order allow,deny Deny from all </FilesMatch> </Directory> # Prevent PHP execution in wp-includes <Directory "/wp-includes/"> <FilesMatch "\.php$"> Order allow,deny Deny from all </FilesMatch> </Directory> # Prevent access to xmlrpc.php if not used <Files xmlrpc.php> Order allow,deny Deny from all </Files> # Prevent unauthorized access to .htaccess <Files .htaccess> Order allow,deny Deny from all </Files> # Block attacking IPs <RequireAll> Require all granted Require not ip 31.121.247.143 Require not ip 86.174.240.185 Require not ip 146.70.184.14 Require not ip 146.70.165.111 Require not ip 105.164.68.162 Require not ip 139.59.34.134 Require not ip 45.38.16.69 Require not ip 185.198.240.239 Require not ip 92.205.250.69 Require not ip 102.212.247.146 Require not ip 92.205.250.74 Require not ip 92.205.250.27 Require not ip 43.135.115.233 </RequireAll> # Block access to admin-ajax.php from suspicious IPs (temporary) <Files "admin-ajax.php"> <RequireAll> Require all granted # Require ip YOUR.OFFICE.IP.HERE # Uncomment to whitelist your IP </RequireAll> </Files> # Rate limit login attempts <Files "wp-login.php"> <IfModule mod_ratelimit.c> SetOutputFilter RATE_LIMIT SetEnv rate-limit 400 SetEnv rate-limit-interval 60 </IfModule> </Files> # BEGIN LiteSpeed # The directives (lines) between "BEGIN LiteSpeed" and "END LiteSpeed" are # dynamically generated, and should only be modified via WordPress filters. # Any changes to the directives between these markers will be overwritten. <IfModule Litespeed> SetEnv noabort 1 </IfModule> # END LiteSpeed # php -- BEGIN cPanel-generated handler, do not edit # Set the “ea-php83” package as the default “PHP” programming language. <IfModule mime_module> AddHandler application/x-httpd-ea-php83 .php .php8 .phtml </IfModule> # php -- END cPanel-generated handler, do not edit <Files 403.shtml> order allow,deny allow from all </Files> deny from 31.121.247.143 deny from 86.174.240.185 deny from 105.164.68.162 deny from 92.205.250.69
| ver. 1.4 |
Github
|
.
| PHP 8.3.30 | Generation time: 0 |
proxy
|
phpinfo
|
Settings