*Cube-Host– full cloud services!!
If your site redirects visitors, shows spam popups, gets blacklisted, or loads suspicious scripts — you need a structured malware check. This guide covers external checks (what visitors and search engines see) and internal checks (files, database, users, logs).
This is especially important for websites on Shared Hosting. If you need more control for server-level scanning and hardening, a Linux VPS or Windows VPS on reliable VPS hosting can simplify security operations.
External checks help you confirm if the issue is visible to visitors/search engines and if your domain is flagged. Use reputable online scanners (by name) to check:
Tip: check your site from an incognito window and also from a mobile network — some infections use conditional redirects.
Before you delete anything, make a snapshot for rollback/forensics:
On Shared Hosting, you can usually do this via file manager + database export tool in the control panel. If you have SSH access, use command-line methods below.
.htaccess (or web.config) for suspicious redirects..php files.These commands are typical for Linux-based hosting environments:
# 1) Find recently modified files (last 7 days)
find . -type f -mtime -7 -not -path "./cache/*" -not -path "./tmp/*" | head -n 200
# 2) Look for common obfuscation patterns in PHP
grep -R --line-number --binary-files=without-match -E "base64_decode\(|gzinflate\(|str_rot13\(|eval\(|preg_replace\(.*/e" . | head -n 200
# 3) Suspicious PHP files in uploads (WordPress example)
find ./wp-content/uploads -type f -name "*.php" | head -n 200
What to look for: long unreadable strings, hidden iframes, strange require/include calls to unknown paths, and PHP files in media folders.
Even if files look clean, injected spam/redirect code can be stored in DB fields (posts/options/settings). Typical targets:
Example approach: search for suspicious domains or <script> tags inside content. Use your DB tool in hosting panel or SQL queries if you have access.
Cleaning without fixing the root cause often leads to reinfection within hours/days. Most common entry points:
WordPress note: you can reinstall core files from a clean source while keeping wp-content. Still, you must scan wp-content carefully because that’s where most malware lives.
To check a website for malware, start with an external scan, then inspect files, database, users, and logs — and always identify the entry point to prevent reinfection. If you host sites on Shared Hosting, keep updates and credentials tight. For deeper control and server-level tooling, consider moving security-critical projects to a Linux VPS or Windows VPS on stable VPS hosting.