2.15.2.1. Antivirus

Important points:

  • The host\'s built-in antivirus only looks for malicious code that has signatures in its database. If a scan does not detect a threat, it does not guarantee its absence.
  • It is recommended to additionally check for malicious code using third-party antivirus software, such as the utility PHP Antimalware Scanner or phpMussel.
  • If you have detected malicious code that our antivirus does not find, you can let us know via online chat. When contacting the chat room, attach an archive with files that are suspected to be malicious.

flowchart LR scan{Scanning} scan-->|Thereis
viruses|block["Limitation
outgoing connections
and mailing limits"] block-->cleaning[Independent
cleaning] cleaning-->rescan{Repeated
scanning} rescan-->|Thereis
viruses|block rescan-->|No
viruses|unblock[Withdrawal
restrictions] unblock-->clean scan-->|No
viruses|clean[No restrictions] style scan fill:#e0e0e0,stroke:#000,stroke-width:0px,color:#000 style block fill:#E76F51,stroke:#000,stroke-width:0px,color:#fff style cleaning fill:#E9C46A,stroke:#000,stroke-width:0px,color:#000style rescan fill:#e0e0e0,stroke:#000,stroke-width:0px,color:#000 style rescan fill:#e0e0e0,stroke:#000,stroke-width:0px,color:#000 style unblock fill:#e0e0e0,stroke:#000,stroke-width:0px,color:#000 style clean fill:#2A9D8F,stroke:#000,stroke-width:0px,color:#fff

The hosting uses our proprietary antivirus. The signature database is regularly updated and supplemented by our specialists, allowing us to find both new threats and old ones that were not previously detected.

Notes:

  • You can run a scan no more than once per hour. If less than one hour has elapsed since the previous scan, the start button will not be available (grayed out instead of green).
  • The contents of the archives are not scanned.

To start scanning, open the section "Antivirus" and press "Scan hosting account files".

When malicious code is detected on mail and in Telegram the corresponding notification is sent and in the section "Antivirus" a report appears with a list of infected and malicious files:

The report has two tabs:

  • Searching results harmful files. Malicious files are defined as files that have all content consists of malicious code. Such files should be deleted completely.
  • Searching results infected files. Infected files are files that usually contain malicious code. fragments. It is not advisable to delete such files completely; you should only get rid of the part of the code that is marked as malicious.

Listed on each tab:

  • Full path to the infected file.
  • Button "Show" opens the file in file manager editor on the line with the highlighted signature (a fragment of the code by which the file was identified as malicious).
  • Date of last modification of the infected file.
  • Information about the possible source of infection.

When malicious code is detected, restrictions are automatically set for the hosting account:

To clean your hosting account from viruses use recommendations.

After purges of the hosting account, run a second scanning. If no threats are detected, the established restrictions will be removed automatically (changes take effect within about 15 minutes).

Content