In order to prevent the intrusion from being discovered, the attacker will always hide himself in various ways, such as: hiding his real IP, clearing system logs, deleting uploaded tools, hiding backdoor files, and erasing traces generated during the intrusion. Wait.
You must reply before you can see the hidden data contained here.