MTR combines the purpose of ping and tracert/traceroute. MTR visualizes performance and latency issues across every machine, or hop, between your local machine and the destination. MTR can help answer the following questions: Is my server slow? If the issue isn’t my server, which hop is? Does a hop have intermittent packet loss? Do I Read More >
SSH and Root Access
SSH Hosting allows for an easier workflow and faster management via the command line. SSH hosting makes managing your server’s file structure both simple and efficient. Take control of your server so that you can increase your productivity while remaining secure at the same time.
How to Check if a Port is Blocked with Telnet
We recommend using Netcat / Ncat, or Nmap for multiple ports instead, as Telnet is NOT encrypted and therefore insecure. The Telnet command line tool tests port connections with your local network router, servers, and websites. For example, Telnet can help you see why the email is being rejected. Telnet is pre-installed on many Windows, Read More >
How to Do a Basic Port Scan with Nmap
Closing unnecessary ports on your server is an important process for PCI compliance and server hardening in general. This reduces what information cyber attackers can easily gather about your web server and services to exploit. This also applies to Small Office / Home Office (SOHO) networks. To scan your local network, you need to know Read More >
How to Check if a Port is Blocked with Netcat / Ncat
If you’re unable to connect to FTP, MySQL, or another service on your server, the port could be blocked by a firewall at many points before the actual software: Local workstation Local network router Virtual Private Network (VPN) or Proxy DNS Resolver Internet service provider (ISP) (e.g. Verizon) Web application firewall (WAF) (e.g. Sucuri) Content Read More >
How to Find Your Local Router IP Address in the Terminal
You can use your local router’s internal IP address to test if a port is blocked by your local network, internet service provider (ISP), or virtual private network (VPN). Most operating systems (OSs) – Windows, macOS, Linux, BSD, etc. – with a graphical user interface (GUI) have pre-installed software that can give you this information. Read More >
Root Access FAQ
If you’re not very familiar with root access to a server, it’s actually quite a big deal. We’ve created this article to help answer several of the more common questions related to root access. What is root access? Root access is administrative access to a server. With root access, you can perform any action needed Read More >
Standard SSH Access vs. Root SSH Access
All of our VPS Hosting, Dedicated Servers and Shared Hosting allow standard SSH access. By default, the ssh access you have is for your specific cPanel account. For example, if your cPanel username is userna5, when you log in via SSH you will only have access to edit files under the userna5 user and not Read More >
How to Blacklist/Whitelist IP Address via SSH
As we continue our series on the cPHulk security features, we will show you the steps to blacklist and whitelist IP addresses via SSH. In the last guide we showed you how to blacklist and whitelist IP addresses in the Web Host Manager or WHM. But doing this with command line using SSH can save Read More >
How to Lookup a CNAME via SSH
In this tutorial, we will show you how to lookup a CNAME record using SSH. This can be an important step when troubleshooting redirect issues. Performing this test via SSH can save time, since it can be done right in a terminal. We also have a helpful guide on how to create a CNAME record. Read More >
Verify File Checksums with SSH
After downloading a file, it’s always helpful to validate it to ensure its not corrupt or malicous. You can accomplish this by comparing checksums – md5sum, sha1, sha256, sha512, etc. – against the original file if its published on the official website. You can use your computer, SSH, and websites such as VirusTotal.com to achieve Read More >