nginx
tcp/443
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09c3e8b9cac3e8b9cacf1312fe5d01d4d57249456c411630186
Found 48 files trough .DS_Store spidering: /1wowpict /bannery /bg.png /BitolaCo /blog1.png /blog2.png /cata1.png /cata2.png /clanky /cs1.png /cs2.png /cs3.png /dokumentace /font.txt /footer_opak.png /fun /geoip /geoip/GeoIP.dat /geoip/geoip.inc /geoip/geoipcity.inc /geoip/geoipregionvars.php /geoip/timezone.php /GeoIP.dat /gta1.png /gta2.png /gta3.png /hand.cur /handglow.cur /im.png /index.php /index.php--- /index_old.php /ip.php /iptest.php /logo.png /logo2.png /motd_tab.png /opak_footer_up.png /OpenTTD.png /OpenTTD2.png /quest.png /quest1.png /show_butt.png /style.css /upline.png /wotlk1.png /wotlk2.png /zaloha pred 25.12.2014
Severity: medium
Fingerprint: 5f32cf5d6962f09cccd847a3ccd847a31c0789a414592be2488f8a6bba85ad90
Found 43 files trough .DS_Store spidering: /1wowpict /bannery /bg.png /BitolaCo /blog1.png /blog2.png /cata1.png /cata2.png /clanky /cs1.png /cs2.png /cs3.png /dokumentace /font.txt /footer_opak.png /fun /geoip /GeoIP.dat /gta1.png /gta2.png /gta3.png /hand.cur /handglow.cur /im.png /index.php /index.php--- /index_old.php /ip.php /iptest.php /logo.png /logo2.png /motd_tab.png /opak_footer_up.png /OpenTTD.png /OpenTTD2.png /quest.png /quest1.png /show_butt.png /style.css /upline.png /wotlk1.png /wotlk2.png /zaloha pred 25.12.2014
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09c70ba7b5770ba7b57e6ad4415286fe83f43d970e7e2ce0fee
Found 54 files trough .DS_Store spidering: /aaa /domains /domains/3server.cz /subdomains /subdomains/administrator /subdomains/alfa /subdomains/backup /subdomains/bannery /subdomains/beta /subdomains/blog /subdomains/cata /subdomains/cata-blbost--zmazat /subdomains/cata-old /subdomains/cata2 /subdomains/cs /subdomains/cs-old /subdomains/eastside /subdomains/fergy /subdomains/for-rum /subdomains/forum /subdomains/fun-old /subdomains/johnny /subdomains/kolostesti /subdomains/legenda /subdomains/lop /subdomains/mailserver /subdomains/manager /subdomains/mcadmin /subdomains/mesicnik /subdomains/minecraft /subdomains/miratyn /subdomains/mohaas /subdomains/mohaascz /subdomains/navody /subdomains/novy /subdomains/obrazky /subdomains/old /subdomains/oteamu /subdomains/painkiller /subdomains/registrace /subdomains/riverghost /subdomains/science /subdomains/sholtotest /subdomains/stats /subdomains/tbc-old /subdomains/test /subdomains/traviantest /subdomains/tweak /subdomains/virtualfit /subdomains/vsestare /subdomains/wotlk /subdomains/wotlk-original /subdomains/wotlk-redirected /subdomains/xandrejcik
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09c70ba7b5770ba7b57e6ad4415286fe83f43d970e7e2ce0fee
Found 54 files trough .DS_Store spidering: /aaa /domains /domains/3server.cz /subdomains /subdomains/administrator /subdomains/alfa /subdomains/backup /subdomains/bannery /subdomains/beta /subdomains/blog /subdomains/cata /subdomains/cata-blbost--zmazat /subdomains/cata-old /subdomains/cata2 /subdomains/cs /subdomains/cs-old /subdomains/eastside /subdomains/fergy /subdomains/for-rum /subdomains/forum /subdomains/fun-old /subdomains/johnny /subdomains/kolostesti /subdomains/legenda /subdomains/lop /subdomains/mailserver /subdomains/manager /subdomains/mcadmin /subdomains/mesicnik /subdomains/minecraft /subdomains/miratyn /subdomains/mohaas /subdomains/mohaascz /subdomains/navody /subdomains/novy /subdomains/obrazky /subdomains/old /subdomains/oteamu /subdomains/painkiller /subdomains/registrace /subdomains/riverghost /subdomains/science /subdomains/sholtotest /subdomains/stats /subdomains/tbc-old /subdomains/test /subdomains/traviantest /subdomains/tweak /subdomains/virtualfit /subdomains/vsestare /subdomains/wotlk /subdomains/wotlk-original /subdomains/wotlk-redirected /subdomains/xandrejcik
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09c70ba7b5770ba7b57e6ad4415286fe83f43d970e7e2ce0fee
Found 54 files trough .DS_Store spidering: /aaa /domains /domains/3server.cz /subdomains /subdomains/administrator /subdomains/alfa /subdomains/backup /subdomains/bannery /subdomains/beta /subdomains/blog /subdomains/cata /subdomains/cata-blbost--zmazat /subdomains/cata-old /subdomains/cata2 /subdomains/cs /subdomains/cs-old /subdomains/eastside /subdomains/fergy /subdomains/for-rum /subdomains/forum /subdomains/fun-old /subdomains/johnny /subdomains/kolostesti /subdomains/legenda /subdomains/lop /subdomains/mailserver /subdomains/manager /subdomains/mcadmin /subdomains/mesicnik /subdomains/minecraft /subdomains/miratyn /subdomains/mohaas /subdomains/mohaascz /subdomains/navody /subdomains/novy /subdomains/obrazky /subdomains/old /subdomains/oteamu /subdomains/painkiller /subdomains/registrace /subdomains/riverghost /subdomains/science /subdomains/sholtotest /subdomains/stats /subdomains/tbc-old /subdomains/test /subdomains/traviantest /subdomains/tweak /subdomains/virtualfit /subdomains/vsestare /subdomains/wotlk /subdomains/wotlk-original /subdomains/wotlk-redirected /subdomains/xandrejcik
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09c70ba7b5770ba7b57e6ad4415286fe83f43d970e7e2ce0fee
Found 54 files trough .DS_Store spidering: /aaa /domains /domains/3server.cz /subdomains /subdomains/administrator /subdomains/alfa /subdomains/backup /subdomains/bannery /subdomains/beta /subdomains/blog /subdomains/cata /subdomains/cata-blbost--zmazat /subdomains/cata-old /subdomains/cata2 /subdomains/cs /subdomains/cs-old /subdomains/eastside /subdomains/fergy /subdomains/for-rum /subdomains/forum /subdomains/fun-old /subdomains/johnny /subdomains/kolostesti /subdomains/legenda /subdomains/lop /subdomains/mailserver /subdomains/manager /subdomains/mcadmin /subdomains/mesicnik /subdomains/minecraft /subdomains/miratyn /subdomains/mohaas /subdomains/mohaascz /subdomains/navody /subdomains/novy /subdomains/obrazky /subdomains/old /subdomains/oteamu /subdomains/painkiller /subdomains/registrace /subdomains/riverghost /subdomains/science /subdomains/sholtotest /subdomains/stats /subdomains/tbc-old /subdomains/test /subdomains/traviantest /subdomains/tweak /subdomains/virtualfit /subdomains/vsestare /subdomains/wotlk /subdomains/wotlk-original /subdomains/wotlk-redirected /subdomains/xandrejcik
Open service 45.138.107.37:443 · wotlk.3server.cz
2026-01-23 03:32
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Fri, 23 Jan 2026 03:32:37 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · www.hosting.3server.cz
2026-01-23 03:32
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Fri, 23 Jan 2026 03:32:36 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · www.mohaas.3server.cz
2026-01-22 23:23
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Thu, 22 Jan 2026 23:23:05 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · mohaascz.3server.cz
2026-01-22 23:23
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Thu, 22 Jan 2026 23:23:05 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.38:443 · unreal.3server.cz
2026-01-22 22:13
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Thu, 22 Jan 2026 22:13:09 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · www.wotlk.3server.cz
2026-01-22 22:13
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Thu, 22 Jan 2026 22:13:10 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.38:443 · 3server.cz
2026-01-22 21:28
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Thu, 22 Jan 2026 21:28:22 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · www.mohaas.3server.cz
2026-01-10 02:42
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Sat, 10 Jan 2026 02:42:05 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · mohaascz.3server.cz
2026-01-10 02:42
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Sat, 10 Jan 2026 02:42:05 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · www.hosting.3server.cz
2026-01-10 01:49
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Sat, 10 Jan 2026 01:49:28 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 45.138.107.37:443 · wotlk.3server.cz
2026-01-10 01:49
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Sat, 10 Jan 2026 01:49:28 GMT
Content-Type: text/html
Content-Length: 2325
Connection: close
X-protocol: HTTP/1.1
Page title: Human Check
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://img.wedos.website/stav/captcha-nice/styles.css">
<link rel="icon" href="https://img.wedos.website/stav/captcha-nice/favicon.png" sizes="32x32">
<link rel="apple-touch-icon" href="https://img.wedos.website/stav/captcha-nice/apple-touch-favicon.png">
<meta charset="UTF-8">
<title>Human Check</title>
<script>
let a=false;function generateRandomString(){return Math.random().toString(36).substr(2,8)}function b(){if(a&&document.getElementById("humanCheck").checked){const r=generateRandomString(),h=window.location.hostname.split("."),d=h.length>2?h.slice(-2).join("."):window.location.hostname;document.cookie="human_verified="+r+"; Path=/; Domain=."+d+"; Max-Age=3600";console.log("Cookie set for: ."+d+" with value: "+r);window.location.href=new URLSearchParams(window.location.search).get("redirect")||window.location.href}else alert("Please move your mouse to verify you are human.")}document.addEventListener("mousemove",()=>a=true),document.addEventListener("DOMContentLoaded",()=>{console.log("Current cookies:",document.cookie),fetch(window.location.href).then(r=>{const t=r.headers.get("X-Request-ID"),e=document.getElementById("x-rid");e.textContent=t?"Transaction ID: "+t:"Error - Request ID not found",t||e.classList.add("error")}).catch(()=>{const r=document.getElementById("x-rid");r.textContent="Error - could not fetch data",r.classList.add("error")})});
</script>
<style>
#x-rid {
position: fixed;
bottom: 10px;
right: 10px;
background: rgba(0, 0, 0, 0.8);
color: white;
padding: 10px;
border-radius: 5px;
font-size: 14px;
}
</style>
</head>
<body>
<p class="head"><a href="https://www.wedos.com/protection" target="_blank">WEDOS Global Protection</a> - cyber security</p>
<h1>KEEPING YOU SAFE</h1>
<h3>We protect this website</h3>
<div style="display: block; padding: 10px;">
<p>Please verify you are human</p>
<p>Move your mouse and check the box to proceed.</p>
<label>
<input type="checkbox" id="humanCheck" onclick="b()"> I am human
</label>
</div>
<div class="header-data" id="x-rid">Loading Request ID...</div>
</body>
</html>
Open service 185.8.237.5:80 · hosting.3server.cz
2026-01-09 17:00
HTTP/1.1 301 Moved Permanently location: https://hosting.3server.cz/ set-cookie: w_tried_https=1; Path=/; Max-Age=600 content-length: 0 connection: close