Abuse originating from a VPS can take many different forms, depending on the operating system, software, or the type of attack involved. The most common cases include sending spam, brute-force attacks, phishing, malware, port scans, or even participation in DDoS attacks.
Handling such incidents depends on the nature of the problem, but there are several basic steps you can take to identify and prevent abuse. It is always recommended to:
If you notice that your VPS is sending unwanted or bulk emails (“spam”) to third-party recipients, the most likely cause is a vulnerability that has been exploited to install a spam script, or an unprotected contact form on one of the websites hosted on your server.
In such cases, you will likely receive an abuse report from your provider or another third party. These reports typically include the email headers of the messages that were sent, which can be used to trace the source or script responsible for sending the spam.
In the past, the most common cause of such incidents was email account hacking (mailbox compromise). However, with the widespread use of CMS platforms such as WordPress, Joomla, Drupal, etc., the main cause has shifted to spam scripts uploaded or injected into website files.
If you receive a notification that spam has been sent from your VPS, it is recommended to perform a full scan of your website’s file system (or all websites hosted on the VPS) to check for any unknown or suspicious files.
If you are not hosting any websites with contact forms, the issue is likely caused by a spam script installed via a security vulnerability.
These scripts are typically PHP files that automatically send bulk emails from your server. They may have been created recently or disguised within existing legitimate CMS files.
Common characteristics of spam scripts include:
23gw1pnb.php, mailr_sendx.php, etc.template.config.php or settings.inc.php, but contain injected malicious code.functions.php or header.php).gzinflate() and base64_decode() functions to obfuscate or encode content.Since CMS installations contain hundreds or thousands of files, it is difficult to visually identify which files are malicious. For that reason, it is important to use scanning tools.
If you suspect that your VPS is infected and sending spam, immediately perform a scan using antivirus tools such as ClamAV, available for most Linux distributions (AlmaLinux, Rocky Linux, CentOS Stream, Ubuntu, Debian).
After installation, you can run a full scan with the following command:
clamscan -r /var/www/
This scan will check all website directories for known malware signatures. If suspicious files are detected, you can move or delete them manually.
For additional security, you can schedule periodic scans via a cron job so that your VPS is automatically scanned (e.g. every 24 hours).
PHPmailer) if not required.Brute-force attacks are often caused by malware installed on compromised CMS systems or through a compromised root user account.
To identify suspicious processes:
ps aux | lesslsof -p processidPhishing sites or malicious files on a VPS are usually placed via known vulnerabilities in CMS platforms. The process of detection and prevention is similar:
Port scans originating from your VPS are usually caused by vulnerabilities exploited by malicious scripts.
Check active network connections using:
netstat -a
If you receive a copyright infringement notice, it usually stems from illegally distributed content (e.g. torrents) or unauthorized use of images/logos.
If your VPS participates in UDP or SYN flood attacks, it is likely infected and part of a botnet.
Miners are often installed through exploited vulnerabilities or unauthorized SSH access.
top or your control panel graphs.kill -9 PID.lsof -p PID.yum -y remove minernamednf -y remove minernameapt -y remove minernamefind /var/ -name minername → rm -f /var/minernameContact our experts, they will be happy to help!
Contact us