Techteam
Host name : A hostname is a unique name for a computer or network node in a network. zoogle.pheonixsolutions.com
IP address :
A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
69.30.219.166
Date:
The date command displays the current date and time.
Mon 04 Sep 2023 12:00:02 AM UTC
Uptime :
Uptime is a command that returns information about how long your system has been running together with the current time, number of users with running sessions, and the system load averages for the past 1, 5, and 15 minutes. It can also filter the information displayed at once depending on your specified options.
00:00:02 up 55 days, 15:28, 0 users, load average: 0.00, 0.01, 0.00
Memory usage :
It shows you how much computer memory your model is using, and how much is available. Please find the memory usage details below.
Disk usage :
Used to check the information of disk usage of files and directories on a machine. Please find the disk usage details below.
Malware : Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. Please find the details of malware hits below.
Rootkit hunter : rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. Please find the details below.
Kernel: The kernel is a computer program at the core of a computer's operating system with complete control over everything in the system. It is an integral part of any operating system. It is the "portion of the operating system code that is always resident in memory".
Linux 5.4.0-153-generic x86_64
SSH Port :
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
Change SSH port : 7102
Disable direct root login and enable wheel user account : Disabling direct root logins prevents someone who knows that every Linux server has a "root" user but doesn't know any usernames on your system from guessing the password and logging in as root. There is a catch - if you disable root login immediately, you will not be able to administer your server from SSH as root. Disable direct root login and enable wheel user account : Implemented