{"id":212,"date":"2020-04-17T13:32:58","date_gmt":"2020-04-17T13:32:58","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=212"},"modified":"2026-04-12T06:06:45","modified_gmt":"2026-04-12T06:06:45","slug":"how-to-install-rkhunter-on-linux-server","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/","title":{"rendered":"How to install Rkhunter on Linux server"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p><strong>Rkhunter (Rootkit Hunter)<\/strong> is an open-source security tool used to scan Linux systems for rootkits, backdoors, and other potential security threats. It works by comparing file hashes, checking for suspicious strings in kernel modules, and verifying system binaries against known good values.<\/p>\n\n\n\n<p>Installing Rkhunter on your Linux server helps enhance system security by providing regular scans and alerts for any unauthorized changes or malicious activities. It is widely used by system administrators as part of a proactive security monitoring strategy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"363\" height=\"139\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png\" alt=\"\" class=\"wp-image-256\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png 363w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images-300x115.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images-150x57.png 150w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Pre-requisites<\/h2>\n\n\n\n<p>Before installing Rkhunter, ensure the following requirements are met:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You should have a running Linux server (e.g., CentOS, RHEL, Ubuntu, Debian).<\/li>\n\n\n\n<li>Administrative access is required to install packages and run security scans.<br><br><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IMPLEMENTATION<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Step 1: Downloading Rkhunter:<\/h4>\n\n\n\n<p>Let\u2019s move the current directory to the temp directory.<br># cd \/tmp<br><br>Download the latest version of Rkhunter by executing the command below. <br>#wget http:\/\/downloads.sourceforge.net\/project\/rkhunter\/rkhunter\/1.4.2\/rkhunter-1.4.2.tar.gz<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 2: Installing Rkhunter:<\/h4>\n\n\n\n<p>Unzip the downloaded rkhunter by using the below command.<br>#tar -zxvf rkhunter-1.4.2.tar.gz<br><br>Change the current working directory to the rkhunter directory.<br>#cd rkhunter-1.4.2<br><br>Install the rkhunter package by executing the installation script.<br>#.\/installer.sh &#8211;layout default &#8211;install<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 3: Updating Rkhunter:<\/h4>\n\n\n\n<p>To check the rkhunter current version.<br>#\/usr\/local\/bin\/rkhunter &#8211;versioncheck<br><br>To update the rkhunter available latest version.<br>#\/usr\/local\/bin\/rkhunter &#8211;update<br><br>If the database files are updated, to check and save the updated values and properties,<br>#\/usr\/local\/bin\/rkhunter &#8211;propupd<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 4: Manual Scan and Usage:<\/h4>\n\n\n\n<p>To scan the entire file system run.<br># rkhunter &#8211;check<\/p>\n\n\n\n<p>Sample Output:<br><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[ Rootkit Hunter version 1.4.2 ]\n\nChecking system commands...\n\n  Performing 'strings' command checks\n    Checking 'strings' command                               [ OK ]\n\n  Performing 'shared libraries' checks\n    Checking for preloading variables                        [ None found ]\n    Checking for preloaded libraries                         [ None found ]\n    Checking LD_LIBRARY_PATH variable                        [ Not found ]\n\n  Performing file properties checks\n    Checking for prerequisites                               [ OK ]\n    \/usr\/local\/bin\/rkhunter                                  [ OK ]\n    \/usr\/sbin\/adduser                                        [ OK ]\n    \/usr\/sbin\/chkconfig                                      [ OK ]\n    \/usr\/sbin\/chroot                                         [ OK ]\n    \/usr\/sbin\/depmod                                         [ OK ]\n    \/usr\/sbin\/fsck                                           [ OK ]\n    \/usr\/sbin\/fuser                                          [ OK ]\n    \/usr\/sbin\/groupadd                                       [ OK ]\n    \/usr\/sbin\/groupdel                                       [ OK ]\n    \/usr\/sbin\/groupmod                                       [ OK ]\n    \/usr\/sbin\/grpck                                          [ OK ]\n    \/usr\/sbin\/ifconfig                                       [ OK ]\n    \/usr\/sbin\/ifdown                                         [ Warning ]\n    \/usr\/sbin\/ifup                                           [ Warning ]\n    \/usr\/sbin\/init                                           [ OK ]\n    \/usr\/sbin\/insmod                                         [ OK ]\n    \/usr\/sbin\/ip                                             [ OK ]\n    \/usr\/sbin\/lsmod                                          [ OK ]\n    \/usr\/sbin\/lsof                                           [ OK ]\n    \/usr\/sbin\/modinfo                                        [ OK ]\n    \/usr\/sbin\/modprobe                                       [ OK ]\n    \/usr\/sbin\/nologin                                        [ OK ]\n    \/usr\/sbin\/pwck                                           [ OK ]\n    \/usr\/sbin\/rmmod                                          [ OK ]\n    \/usr\/sbin\/route                                          [ OK ]\n    \/usr\/sbin\/rsyslogd                                       [ OK ]\n    \/usr\/sbin\/runlevel                                       [ OK ]\n    \/usr\/sbin\/sestatus                                       [ OK ]\n    \/usr\/sbin\/sshd                                           [ OK ]\n    \/usr\/sbin\/sulogin                                        [ OK ]\n    \/usr\/sbin\/sysctl                                         [ OK ]\n    \/usr\/sbin\/tcpd                                           [ OK ]\n    \/usr\/sbin\/useradd                                        [ OK ]\n    \/usr\/sbin\/userdel                                        [ OK ]\n    \/usr\/sbin\/usermod                                        [ OK ]\n....\n[Press  to continue]\n\n\nChecking for rootkits...\n\n  Performing check of known rootkit files and directories\n    55808 Trojan - Variant A                                 [ Not found ]\n    ADM Worm                                                 [ Not found ]\n    AjaKit Rootkit                                           [ Not found ]\n    Adore Rootkit                                            [ Not found ]\n    aPa Kit                                                  [ Not found ]\n.....\n\n[Press  to continue]\n\n\n  Performing additional rootkit checks\n    Suckit Rookit additional checks                          [ OK ]\n    Checking for possible rootkit files and directories      [ None found ]\n    Checking for possible rootkit strings                    [ None found ]\n\n....\n[Press  to continue]\n\n\nChecking the network...\n\n  Performing checks on the network ports\n    Checking for backdoor ports                              [ None found ]\n....\n  Performing system configuration file checks\n    Checking for an SSH configuration file                   [ Found ]\n    Checking if SSH root access is allowed                   [ Warning ]\n    Checking if SSH protocol v1 is allowed                   [ Warning ]\n    Checking for a running system logging daemon             [ Found ]\n    Checking for a system logging configuration file         [ Found ]\n    Checking if syslog remote logging is allowed             [ Not allowed ]\n...\nSystem checks summary\n=====================\n\nFile properties checks...\n    Files checked: 137\n    Suspect files: 6\n\nRootkit checks...\n    Rootkits checked : 383\n    Possible rootkits: 0\n\nApplications checks...\n    Applications checked: 5\n    Suspect applications: 2\n\nThe system checks took: 5 minutes and 38 seconds\n\nAll results have been written to the log file: \/var\/log\/rkhunter.log\n\nOne or more warnings have been found while checking the system.\nPlease check the log file (\/var\/log\/rkhunter.log)<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Step 5: <strong>Scheduling Automatic Scans<\/strong>:<\/h4>\n\n\n\n<p>Setting Cronjob and Email Alerts:<br>Create a file called&nbsp;<strong>rkhunter.sh<\/strong>&nbsp;under&nbsp;<strong>\/etc\/cron.daily\/<\/strong>, which then scans your file system every day and sends email notifications to your email id.<br><br>Open the file to write the script.<br># vi \/etc\/cron.daily\/rkhunter.sh<br><br>Paste the below-given script in this file and replace \u201c<strong>Server name<\/strong>\u201d with your \u201c<strong>Server Host Name\u201d<\/strong> and \u201c<strong>mail id<\/strong>\u201d with your \u201c<strong>Email Id<\/strong>\u201c.<br><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">#!\/bin\/sh\n(\n\/usr\/local\/bin\/rkhunter --versioncheck\n\/usr\/local\/bin\/rkhunter --update\n\/usr\/local\/bin\/rkhunter --cronjob --report-warnings-only\n) | \/bin\/mail -s 'rkhunter Daily Run <strong>(Server name)' mail id<\/strong><\/pre>\n\n\n\n<p>Change the permission of the file to 755.<br># chmod 755 \/etc\/cron.daily\/rkhunter.sh<\/p>\n\n\n\n<p>For more information and options please run the following command<br># rkhunter &#8211;help<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 6: <strong>Configuration Of Rkhunter<\/strong><\/h4>\n\n\n\n<p>Configuration file of rkhunter is&nbsp;<strong>\/etc\/rkhunter.conf&nbsp;<\/strong>. We can modify the properties of rkhunter accordingly to secure the server.<\/p>\n\n\n\n<p>To restrict the root login to the server over SSH<br>ALLOW_SSH_ROOT_USER = no<\/p>\n\n\n\n<p>To allow the root login to the server over SSH&nbsp;<br>ALLOW_SSH_ROOT_USER = yes<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion:<\/h4>\n\n\n\n<p>Installing Rkhunter on a Linux server is a simple yet effective step toward strengthening system security. By regularly scanning for rootkits and suspicious activities, it helps administrators detect potential threats early and take corrective actions.<\/p>\n\n\n\n<p>While Rkhunter is not a complete security solution on its own, it serves as a valuable addition to your overall security strategy when combined with firewalls, intrusion detection systems, and regular system updates. Keeping Rkhunter updated and running scheduled scans ensures continuous monitoring and improved protection of your server environment.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Rkhunter (Rootkit Hunter) is an open-source security tool used to scan Linux systems for rootkits, backdoors, and other potential security threats. It works by comparing file hashes, checking for suspicious strings in kernel modules, and verifying system binaries against known good values. Installing Rkhunter on your Linux server helps enhance system security by providing ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,4],"tags":[9],"class_list":["post-212","post","type-post","status-publish","format-standard","hentry","category-dedicated-hosting","category-vps-hosting","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction Rkhunter (Rootkit Hunter) is an open-source security tool used to scan Linux systems for rootkits, backdoors, and other potential security threats. It works by comparing file hashes, checking for suspicious strings in kernel modules, and verifying system binaries against known good values. Installing Rkhunter on your Linux server helps enhance system security by providing ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-17T13:32:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-12T06:06:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png\" \/>\n\t<meta property=\"og:image:width\" content=\"363\" \/>\n\t<meta property=\"og:image:height\" content=\"139\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"knowledge-base\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"knowledge-base\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/\"},\"author\":{\"name\":\"knowledge-base\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\"},\"headline\":\"How to install Rkhunter on Linux server\",\"datePublished\":\"2020-04-17T13:32:58+00:00\",\"dateModified\":\"2026-04-12T06:06:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/\"},\"wordCount\":505,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/images.png\",\"keywords\":[\"Security\"],\"articleSection\":[\"Dedicated Hosting\",\"VPS Hosting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/\",\"name\":\"How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/images.png\",\"datePublished\":\"2020-04-17T13:32:58+00:00\",\"dateModified\":\"2026-04-12T06:06:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/images.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/images.png\",\"width\":363,\"height\":139},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/17\\\/how-to-install-rkhunter-on-linux-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to install Rkhunter on Linux server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\",\"name\":\"knowledge-base\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"caption\":\"knowledge-base\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/knowledge-base\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/","og_locale":"en_US","og_type":"article","og_title":"How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base","og_description":"Introduction Rkhunter (Rootkit Hunter) is an open-source security tool used to scan Linux systems for rootkits, backdoors, and other potential security threats. It works by comparing file hashes, checking for suspicious strings in kernel modules, and verifying system binaries against known good values. Installing Rkhunter on your Linux server helps enhance system security by providing ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2020-04-17T13:32:58+00:00","article_modified_time":"2026-04-12T06:06:45+00:00","og_image":[{"width":363,"height":139,"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png","type":"image\/png"}],"author":"knowledge-base","twitter_card":"summary_large_image","twitter_misc":{"Written by":"knowledge-base","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/"},"author":{"name":"knowledge-base","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b"},"headline":"How to install Rkhunter on Linux server","datePublished":"2020-04-17T13:32:58+00:00","dateModified":"2026-04-12T06:06:45+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/"},"wordCount":505,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png","keywords":["Security"],"articleSection":["Dedicated Hosting","VPS Hosting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/","name":"How to install Rkhunter on Linux server - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png","datePublished":"2020-04-17T13:32:58+00:00","dateModified":"2026-04-12T06:06:45+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/images.png","width":363,"height":139},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/17\/how-to-install-rkhunter-on-linux-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to install Rkhunter on Linux server"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b","name":"knowledge-base","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","caption":"knowledge-base"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/knowledge-base\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":20,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":3296,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/212\/revisions\/3296"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}