{"id":46215,"date":"2022-02-18T11:42:43","date_gmt":"2022-02-18T11:42:43","guid":{"rendered":"\/tutorials\/?p=46215"},"modified":"2026-02-16T04:55:28","modified_gmt":"2026-02-16T04:55:28","slug":"how-to-diagnose-and-fix-a-hacked-website","status":"publish","type":"post","link":"\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","title":{"rendered":"How to diagnose and fix a hacked website: A complete guide for 2026"},"content":{"rendered":"<p>The rapid evolution of technology coincides with the rising number of cybersecurity threats. With 30,000 websites falling victim to hackers every day, there&rsquo;s no guarantee your website won&rsquo;t be next.<\/p><p>If your website has already been breached, make sure to fix it at the soonest opportunity. This way, you&rsquo;ll minimize the damage which may include lost brand reputation and revenue, lawsuits, and plummeting search rankings.<\/p><p>This article will cover the symptoms of a hacked website and how to fix it. You will also learn a few different ways to secure your website from future attacks and the best way to communicate the security mishap to your visitors.<\/p><figure class=\"wp-block-image size-large\"><a href=\"https:\/\/assets.hostinger.com\/content\/tutorials\/pdf\/How-to-Speed-Up-Your-Website-EN.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"2048\" height=\"566\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/public\" alt=\"\" class=\"wp-image-69260\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=2048,fit=scale-down 2048w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/><\/a><\/figure><p>\n\n\n\n\n\n\n<\/p><h2 class=\"wp-block-heading\" id=\"h-how-to-check-if-your-website-has-been-compromised\">How to Check if Your Website Has Been Compromised<\/h2><p>Before taking action to clean your website, you need to confirm whether it has been breached.<\/p><p>The signs indicating that a website has been hacked vary and may even be invisible, depending on the type of attack. The following is a list of common indications that a site has been compromised:<\/p><ul class=\"wp-block-list\">\n<li>Alerts about hacking from browsers and search engines.<\/li>\n\n\n\n<li>Links redirecting to shady websites.<\/li>\n\n\n\n<li>High volumes of traffic from other countries.<\/li>\n\n\n\n<li>Defaced or broken webpages.<\/li>\n\n\n\n<li>Slower load time than usual.<\/li>\n\n\n\n<li>Google blocklist warnings.<\/li>\n\n\n\n<li>Sent emails end up in spam.<\/li>\n\n\n\n<li>Website takedown by hosting provider.<\/li>\n\n\n\n<li>Unsavory advertisements.<\/li>\n\n\n\n<li>White screen of death.<\/li>\n\n\n\n<li>Random code fragments appearing on the header or footer.<\/li>\n<\/ul><p>Plenty of website checkers like <a href=\"https:\/\/sitecheck.sucuri.net\/\" target=\"_blank\" rel=\"noopener\">Sucuri SiteCheck<\/a>, <a href=\"https:\/\/www.dehashed.com\/\" target=\"_blank\" rel=\"noopener\">DeHashed<\/a>, and <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">Have I Been Pwned?<\/a> are available to confirm your suspicions. We recommend checking your website with more than one tool for more accurate results.<\/p><h2 class=\"wp-block-heading\" id=\"h-10-steps-to-fix-a-hacked-website\">10 Steps to Fix a Hacked Website<\/h2><p>Once you have confirmed that your website has been hacked, take action to fix it. The following steps will guide you through the process of recovering and fixing your hacked website.<\/p><h3 class=\"wp-block-heading\" id=\"h-1-stay-calm-and-don-t-panic\">1. Stay Calm and Don&rsquo;t Panic<\/h3><p>There&rsquo;s no reason to panic &ndash; hacked websites are generally recoverable. Reacting emotionally without calmly evaluating the situation may lead to more harm than good.<\/p><p>Therefore, remain composed and proceed to the next step.<\/p><h3 class=\"wp-block-heading\" id=\"h-2-change-your-passwords-and-review-access\">2. Change Your Passwords and Review Access<\/h3><p>Brute-force attacks are some of the most common cybersecurity threats. Hackers attempt to guess the admin account&rsquo;s password using various combinations of letters and numbers.<\/p><p>Changing all of your passwords will revoke hackers&rsquo; access to your website and prevent them from compromising other accounts and causing more damage.<\/p><p>Here&rsquo;s a checklist of the accounts the passwords of which you&rsquo;ll need to reset at the soonest opportunity:<\/p><ul class=\"wp-block-list\">\n<li>Hosting account.<\/li>\n\n\n\n<li>FTP accounts (primary and secondary).<\/li>\n\n\n\n<li><a href=\"\/tutorials\/change-wordpress-password\/\">Content management system admin account<\/a>.<\/li>\n\n\n\n<li>Databases (do so via the database connection file).<\/li>\n\n\n\n<li>Email accounts associated with the hacked website.<\/li>\n<\/ul><p>\n\n\n<div><p class=\"important\"><strong>Important!<\/strong> If you have other accounts with the same login credentials as your hacked website, change them immediately. This applies to social media accounts, private email accounts, and other personal accounts. Keep in mind that you shouldn&rsquo;t reuse passwords in the first place.<\/p><\/div>\n\n\n\n<\/p><p>Besides changing all your passwords, we also recommend reviewing website user access privileges. If hackers manage to enter the site using an admin account, they will have full access to all the administration features.<\/p><p>If the hacked website is hosted on WordPress, <a href=\"\/tutorials\/create-manage-wordpress-user-roles-permissions\">check the existing user roles and permissions<\/a> by accessing <strong>Users <\/strong>from the admin dashboard. Review accounts with super admin and admin roles as they have the highest level of access privileges.<\/p><p>Follow the same procedure on platforms that grant access to multiple users, such as your hosting control panel and <a href=\"\/tutorials\/how-to-create-ftp-accounts\">FTP account<\/a>.<\/p><p>Set the appropriate permissions to your website files, particularly those in the root directory (<strong>public_html<\/strong>) like the <strong>wp-admin<\/strong> folder and <a href=\"\/tutorials\/wp-config-php\">wp-config.php file<\/a> via the web host&rsquo;s File Manager. Doing so will prevent unauthorized users from accessing, modifying, and executing existing files.<\/p><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Take advantage of a <a href=\"https:\/\/nordpass.com\/password-generator\/\" target=\"_blank\" rel=\"noopener\"> password generator <\/a> to manage your passwords and store password backups.<\/p>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-3-create-a-backup-of-your-website\">3. Create a Backup of Your Website<\/h3><p>Your website might have been hacked, but it&rsquo;s still functional and has all the important data. By <a href=\"\/tutorials\/backups\/downloading-website-backup\">downloading a website backup<\/a>, you&rsquo;ll be able to re-upload this website version and redo the cleanup process should it fail the first time.<\/p><p>\n\n\n<div><p class=\"important\"><strong>Important!<\/strong>  Keep the post-hack backup file separate from the older versions. The non-corrupted backup files will serve as your Plan B should the recovery process fail.<\/p><\/div>\n\n\n<div class=\"editor\">\n                    <h4 class=\"title\">Expert Tip<\/h4>\n                    <p>Try to store your website backup files at least in two different places &ndash; one on the cloud and one on a portable hard drive. <\/p><p>Go for a system that can automatically create full incremental backups. It is important that the service is capable of detecting changes made after backups so that it will only sync those parts rather than going for a complete backup every time.<\/p><p>Based on these criteria, any cloud storage should do the trick.<\/p>\n                    <div class=\"d-flex mt-40\">\n                        <div class=\"author-photo\">\n                            <img decoding=\"async\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/05\/andreasgrant.png\/w=65,h=65,fit=scale-down\" width=\"65\" height=\"65\" class=\"border-radius-50\" alt=\"Editor\" \/>\n                        <\/div>\n                        <div class=\"mt-auto mb-auto\">\n                            <p class=\"author-name\">Andreas G.<\/p>\n                            <p class=\"author-position\">Founder at Networks Hardware<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-4-trace-back-your-actions\">4. Trace Back Your Actions<\/h3><p>Most hack attempts happen after a website undergoes some changes, creating new vulnerabilities to exploit. By tracing back your actions, you should be able to identify the source of the security issues much faster.<\/p><p>Narrow down the time window by checking your web logs for a sudden spike of traffic. Then, inspect your <a href=\"https:\/\/support.hostinger.com\/en\/articles\/5650167-how-to-use-the-access-logs-section-on-hpanel\" target=\"_blank\" rel=\"noopener\">access logs<\/a> and <a href=\"\/tutorials\/website\/how-to-check-your-website-error-log\">error logs<\/a> through your hosting control panel to identify any suspicious activity or errors that occurred within the suspected time frame.<\/p><figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.hostinger.com\/tutorials\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\"><img decoding=\"async\" width=\"1505\" height=\"793\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/public\" alt=\"The Analytics menu on hPanel, highlighting the Access logs option\" class=\"wp-image-82283\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/w=1505,fit=scale-down 1505w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-performance-analytics-accesslogs.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1505px) 100vw, 1505px\" \/><\/a><\/figure><p>After figuring out the time the hack occurred, examine all the changes you made before it. In WordPress, malicious code usually enters the site through new files introduced by plugins, themes, and WordPress core installations.<\/p><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Hostinger users can find <strong>Access Logs<\/strong> under the <strong>Website<\/strong> section of hPanel. To access error logs, navigate to <strong>PHP Configuration<\/strong> in the <strong>Advanced<\/strong> directory.<\/p>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-5-investigate-recent-breaches-online\">5. Investigate Recent Breaches Online<\/h3><p>Even popular software may suffer from security breaches. Keeping yourself up-to-date with cyber security news will help you find the vulnerabilities much easier and remove faulty software before it can wreak havoc on your website.<\/p><p>Here are some of the best cybersecurity websites our security experts recommend:<\/p><ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/thehackernews.com\/\" target=\"_blank\" rel=\"noopener\">Hacker News<\/a> &#8210; provides hacking news.<\/li>\n\n\n\n<li><a href=\"https:\/\/secure.wphackedhelp.com\/blog\/\" target=\"_blank\" rel=\"noopener\">WP Hacked Help Blog<\/a> &#8210; offers WordPress security tips on hacked website repair.<\/li>\n\n\n\n<li><a href=\"https:\/\/danielmiessler.com\/\" target=\"_blank\" rel=\"noopener\">Daniel Miessler<\/a> &#8210; publishes articles and tutorials about website security and technology in general.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.itsecurityguru.org\/\" target=\"_blank\" rel=\"noopener\">IT Security Guru<\/a> &#8210; focuses on cyber security, cyber crime, and ransomware.<\/li>\n\n\n\n<li><a href=\"https:\/\/securityweekly.com\/blog\" target=\"_blank\" rel=\"noopener\">Security Weekly Blog<\/a> &#8210; provides weekly updates on cyber security in the form of live streams.<\/li>\n<\/ul><p>\n\n\n<div class=\"editor\">\n                    <h4 class=\"title\">Expert Tip<\/h4>\n                    <p>One of the best ways to keep up with security breaches online is to set customized alerts. <\/p><p>Depending on the type of news you are after, you can configure IFTTT or design scripts to receive notifications whenever a new topic is getting popular in the cybersecurity community. <\/p><p>Besides that, remember to follow all the top security professionals and alert feeds of websites like <a href=\"https:\/\/isc.sans.edu\/\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center<\/a> and <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">Have I Been Pwned<\/a>.<\/p>\n                    <div class=\"d-flex mt-40\">\n                        <div class=\"author-photo\">\n                            <img decoding=\"async\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/05\/andreasgrant.png\/w=65,h=65,fit=scale-down\" width=\"65\" height=\"65\" class=\"border-radius-50\" alt=\"Editor\" \/>\n                        <\/div>\n                        <div class=\"mt-auto mb-auto\">\n                            <p class=\"author-name\">Andreas G.<\/p>\n                            <p class=\"author-position\">Founder at Networks Hardware<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-6-talk-with-your-hosting-provider\">6. Talk With Your Hosting Provider<\/h3><p>If your hacked website runs on shared hosting, the source of the security issues might originate from another website on the same shared server. In this case, cyber attacks could also target your hosting account.<\/p><p>Contact your hosting company to check whether the other websites on the same server have also been attacked.<\/p><p>Most web hosts also provide users with access to web logs, allowing you to monitor website visits. If server access logging is disabled by default, get in touch with your hosting provider or enable it manually.<\/p><p>As a reminder, make sure to opt for <a href=\"\/web-hosting\">secure web hosting<\/a> to prevent your site from hacking incidents. Here at Hostinger, we include anti-malware protection such as <a href=\"https:\/\/www.monarx.com\/\" target=\"_blank\" rel=\"noopener\">Monarx<\/a> in our shared plans.<\/p><figure class=\"wp-block-image size-full\"><a class=\"hgr-tutorials-cta hgr-tutorials-cta-web-hosting\" href=\"\/web-hosting\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"300\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/public\" alt=\"Hostinger web hosting banner\" class=\"wp-image-98604\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><h3 class=\"wp-block-heading\" id=\"h-7-investigate-with-google-blocklist-and-spam-blocklist\">7. Investigate with Google Blocklist and Spam Blocklist<\/h3><p>If Google detects suspicious or dangerous activity on a website, the search engine will likely block it. When a <a href=\"\/tutorials\/what-is-url-blacklist\">website gets blocklisted<\/a>, it won&rsquo;t appear on search results to protect visitors from potential malware.<\/p><p>Check whether your website ends up on Google Blocklist using <a href=\"https:\/\/support.hostinger.com\/en\/articles\/3692620-how-to-add-a-domain-to-the-google-search-console\" target=\"_blank\" rel=\"noopener\">Google Search Console<\/a>. The warning will appear in <strong>Security Issues<\/strong> under the <strong>Security &amp; Manual Actions<\/strong> section.<\/p><figure class=\"wp-block-image size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\"><img decoding=\"async\" width=\"1024\" height=\"470\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\/public\" alt=\"The security issues section in Google Search Console\" class=\"wp-image-46249\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/no-issues-detected.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><p><a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/search?hl=en\" target=\"_blank\" rel=\"noopener\">Google Safe Browsing<\/a> is another tool you can use to check your website&rsquo;s status. It will let you know whether the site is safe to visit.<\/p><p>If you don&rsquo;t have access to the <a href=\"\/tutorials\/how-to-use-hostinger-dns-zone-editor\">DNS zone editor<\/a>, examine your website traffic via <a href=\"\/tutorials\/wordpress\/how-to-add-google-analytics-to-wordpress\">Google Analytics<\/a>. Having a sudden drop in traffic will be a solid confirmation that Google has blocklisted your website.<\/p><p>Besides Google Blocklist, your website might also appear on the anti-spam database. Internet service providers, mailbox providers, and anti-spam platforms use spam blocklists to prevent spam emails from entering their system. Emails from IP addresses listed on this blocklist will be blocked or end up in the spam folder.<\/p><figure class=\"wp-block-image size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\"><img decoding=\"async\" width=\"1348\" height=\"436\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/public\" alt=\"Checking a domain's health using MxToolbox.\" class=\"wp-image-46250\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/w=1348,fit=scale-down 1348w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/02\/mxtoolbox.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1348px) 100vw, 1348px\" \/><\/a><\/figure><p>Clarify whether your domain is listed on the spam blocklist using domain health checkers like <a href=\"https:\/\/mxtoolbox.com\/domain\/\" target=\"_blank\" rel=\"noopener\">MxToolBox<\/a> and <a href=\"https:\/\/dnschecker.org\/domain-health-checker.php\" target=\"_blank\" rel=\"noopener\">Domain DNS Health Checker<\/a>. Besides giving insights into the domain&rsquo;s status, these tools can pinpoint issues related to your web server, mail server, and DNS.<\/p><h3 class=\"wp-block-heading\" id=\"h-8-reset-your-htaccess-file\">8. Reset Your .htaccess File<\/h3><p><strong>.htaccess<\/strong> is a file containing high-level configuration setups for a website hosted on the Apache Web Server. For this reason, <strong>.htaccess<\/strong> is a popular target of cyber attacks.<\/p><p>Some of the most common <strong>.htaccess<\/strong> file exploits include:<\/p><ul class=\"wp-block-list\">\n<li>Redirection from search engines to malware.<\/li>\n\n\n\n<li>Redirection from error pages to malware.<\/li>\n\n\n\n<li>Malware attachment to PHP files.<\/li>\n\n\n\n<li>Information disclosure.<\/li>\n\n\n\n<li><a href=\"https:\/\/pixelprivacy.com\/resources\/browser-fingerprinting\/\" target=\"_blank\" rel=\"noopener\">Browser fingerprinting<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.proofpoint.com\/us\/threat-reference\/watering-hole\" target=\"_blank\" rel=\"noopener\">Watering hole attacks<\/a>.<\/li>\n<\/ul><p>Disabling and restoring your <strong>.htaccess<\/strong> file to its original version might help troubleshoot the security issue. Additionally, change its file permissions so that only certain users can access it.<\/p><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Hostinger users can <a href=\"\/tutorials\/locate-and-create-htaccess\">locate and modify the .htaccess file<\/a> via hPanel&rsquo;s <strong>File Manager<\/strong>.<\/p>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-9-examine-your-website-and-fix-the-vulnerability\">9. Examine Your Website and Fix the Vulnerability<\/h3><p>Security vulnerabilities aren&rsquo;t always visible to administrators. We recommend using website scanning tools to double-check your entire website for vulnerabilities and fix them.<\/p><p><strong>Use a Scanning Plugin or Tool<\/strong><\/p><p>WordPress users have access to various free and premium security plugins, most of which can scan your website for compromised files and detect any malicious code.<\/p><p>We recommend using plugins when <a href=\"\/tutorials\/hacked-wordpress\">recovering a hacked WordPress website<\/a>, as they help avoid misconfigurations that will worsen the situation. However, ensure they are reputable and up-to-date.&nbsp;<\/p><p>Here are some of the most popular freemium <a href=\"\/tutorials\/wordpress-security-plugins\">WordPress security plugins<\/a> to consider:<\/p><ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/wordpress.org\/plugins\/sucuri-scanner\/\" target=\"_blank\" rel=\"noopener\">Sucuri Security<\/a> &#8210; provides server-side and remote scanning, post-hack security actions, and file integrity monitoring.<\/li>\n\n\n\n<li><a href=\"https:\/\/wordpress.org\/plugins\/wordfence\/\" target=\"_blank\" rel=\"noopener\">Wordfence<\/a> &#8210; comes equipped with real-time firewall rules and malware signature updates.<\/li>\n\n\n\n<li><a href=\"https:\/\/wordpress.org\/plugins\/jetpack\/\" target=\"_blank\" rel=\"noopener\">Jetpack<\/a> &#8210; offers malware scanning, real-time backups, and spam filtering.<\/li>\n\n\n\n<li><a href=\"https:\/\/wordpress.org\/plugins\/bulletproof-security\/\" target=\"_blank\" rel=\"noopener\">BulletProof Security<\/a> &#8210; provides setup wizard autofix, malware scanner, login monitoring, and force strong passwords tools.<\/li>\n\n\n\n<li><a href=\"https:\/\/wordpress.org\/plugins\/wpscan\/\" target=\"_blank\" rel=\"noopener\">WPScan<\/a> &#8210; supports scheduled security scanning for known vulnerabilities of the WordPress core, plugins, and themes.<\/li>\n<\/ul><p>Meanwhile, the following scanning tools are compatible with other CMSs besides WordPress:<\/p><ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/hostedscan.com\/\" target=\"_blank\" rel=\"noopener\">HostedScan Security<\/a> &#8210; performs vulnerability scanning on networks, servers, and websites.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.intruder.io\/\" target=\"_blank\" rel=\"noopener\">Intruder<\/a> &#8210; a cloud-based scanner that supports internal, external, and cloud vulnerability scanning.<\/li>\n\n\n\n<li><a href=\"https:\/\/detectify.com\/\" target=\"_blank\" rel=\"noopener\">Detectify<\/a> &#8210; offers automated asset monitoring and testing supported by an ethical hacker community.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.immuniweb.com\" target=\"_blank\" rel=\"noopener\">ImmuniWeb<\/a> &#8210; provides various website security tests adhering to GDPR and PCI DSS standards.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.siteguarding.com\/en\" target=\"_blank\" rel=\"noopener\">SiteGuarding<\/a> &#8210; supports search engine blocklist monitoring, daily file scanning, file change monitoring, and malware detection and cleanup.<\/li>\n<\/ul><p>Make sure to follow the best <a href=\"\/tutorials\/how-to-secure-wordpress\">WordPress security practices<\/a> to protect your site. <\/p><p>\n\n\n<div class=\"editor\">\n                    <h4 class=\"title\">Expert Tip<\/h4>\n                    <p>Make sure the scanner manages to detect all the web applications that are part of your site. If the crawler is not able to crawl all the existing web applications, that leaves room for vulnerabilities. <\/p><p>Another key feature to look for is how easy it is to integrate it with external tools. This is necessary if you want to automate most of the process.<\/p>\n                    <div class=\"d-flex mt-40\">\n                        <div class=\"author-photo\">\n                            <img decoding=\"async\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/05\/andreasgrant.png\/w=65,h=65,fit=scale-down\" width=\"65\" height=\"65\" class=\"border-radius-50\" alt=\"Editor\" \/>\n                        <\/div>\n                        <div class=\"mt-auto mb-auto\">\n                            <p class=\"author-name\">Andreas G.<\/p>\n                            <p class=\"author-position\">Founder at Networks Hardware<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\n\n<\/p><p><strong>Scan Your Files and Database Tables Manually<\/strong><\/p><p>Another way to <a href=\"\/tutorials\/how-to-check-a-website-for-viruses\">detect and remove malware from your site<\/a> involves scanning the website files manually. You can do so with PC antivirus software like <a href=\"https:\/\/www.mcafee.com\/\" target=\"_blank\" rel=\"noopener\">McAfee<\/a> and <a href=\"https:\/\/www.eset.com\/\" target=\"_blank\" rel=\"noopener\">ESET<\/a> or your operating system&rsquo;s built-in antivirus program &#8210; <a href=\"https:\/\/www.microsoft.com\/en-id\/windows\/comprehensive-security\" target=\"_blank\" rel=\"noopener\">Microsoft Defender<\/a> for Windows users and <a href=\"https:\/\/support.apple.com\/guide\/security\/protecting-against-malware-sec469d47bd8\/web\" target=\"_blank\" rel=\"noopener\">XProtect<\/a> for Mac users.<\/p><p>Follow these steps to scan website files manually:<\/p><ol class=\"wp-block-list\">\n<li>Download all the files via your hosting control panel. Hostinger users can <a href=\"\/tutorials\/backups\/downloading-website-backup\">download website files<\/a> through the <strong>Backups <\/strong>menu in hPanel.<\/li>\n<\/ol><figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.hostinger.com\/tutorials\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-files-backups-sidebar.png\"><img decoding=\"async\" width=\"430\" height=\"508\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-files-backups-sidebar.png\/public\" alt=\"The Backups button in hPanel\" class=\"wp-image-80379\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-files-backups-sidebar.png\/w=430,fit=scale-down 430w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-files-backups-sidebar.png\/w=254,fit=scale-down 254w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/03\/hpanel-files-backups-sidebar.png\/w=127,fit=scale-down 127w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/a><\/figure><ol start=\"2\" class=\"wp-block-list\">\n<li>Perform a full scan of the files with your chosen antivirus software.<\/li>\n\n\n\n<li>Resolve all the detected issues.<\/li>\n\n\n\n<li>Upload the clean website files to the server.<\/li>\n<\/ol><p>Next, clean up your database tables through <a href=\"https:\/\/support.hostinger.com\/en\/articles\/1583545-how-to-access-phpmyadmin-in-hpanel\" target=\"_blank\" rel=\"noopener\">phpMyAdmin<\/a>. Remove any records containing suspicious code as well as new records you don&rsquo;t create. The easiest way to start is from tables that manage existing pages and posts (<strong>wp-posts<\/strong> and <strong>wp-options<\/strong> tables in WordPress).<\/p><p><strong>Hire a Cyber Security Expert<\/strong><\/p><p>Website owners who don&rsquo;t have technical knowledge may find the previous methods difficult. If this is the case, it&rsquo;s best to entrust your hacked website to a cyber security expert. This method may be more costly than the other two, but it guarantees a successful cleanup and restoration of your website.<\/p><p>Luckily, tons of cyber security agencies and specialists offer cleanup services to global customers. Some of the best cyber security companies include <a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks<\/a>, and <a href=\"https:\/\/bugcrowd.com\/\" target=\"_blank\" rel=\"noopener\">Bugcrowd<\/a>. Alternatively, find a cyber security expert on job search websites like LinkedIn and hire them as an independent contractor.<\/p><p>When choosing a cyber security company or expert to work with, make sure to:<\/p><ul class=\"wp-block-list\">\n<li>Check the company or expert&rsquo;s reputation and portfolio.<\/li>\n\n\n\n<li>Allocate a realistic budget to afford high-quality services.<\/li>\n\n\n\n<li>Check the company or expert&rsquo;s reviews.<\/li>\n\n\n\n<li>Consider if you have easy access to a reliable support team.<\/li>\n<\/ul><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Don&rsquo;t fall for low prices as this usually indicates poor quality work, which can cause more issues on your site.<\/p>\n                <\/div>\n\n\n\n<\/p><p><strong>Restore a Backup<\/strong><\/p><p>If the previous methods seem too time-consuming or costly, you can <a href=\"https:\/\/support.hostinger.com\/en\/articles\/4283700-how-to-restore-a-website-backup-at-hostinger\" target=\"_blank\" rel=\"noopener\">restore the website backup file<\/a> instead. This method will remove any data and changes made since the backup was created, so we recommend resorting to this only if you can afford the data loss.<\/p><p>For this reason, this method is best for fixing websites that don&rsquo;t undergo frequent changes or are built for testing purposes.<\/p><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>After restoring the website backup, <a href=\"\/tutorials\/clear-browser-cache\">clear the browser cache<\/a> and <a href=\"\/tutorials\/how-to-flush-dns\">flush the local DNS cache<\/a> to see the changes.<\/p>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-10-scan-your-pc-with-antivirus-software\">10. Scan Your PC with Antivirus Software<\/h3><p>The last step is to scan your computer for malware to make sure that whatever infected your website doesn&rsquo;t compromise your machine as well.<\/p><p>We recommended McAfee and ESET earlier as premium software. The following are some of the best free antivirus solutions to choose from:<\/p><ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.avg.com\/\" target=\"_blank\" rel=\"noopener\">AVG Free Antivirus<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.avast.com\/\" target=\"_blank\" rel=\"noopener\">Avast<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.avira.com\/\" target=\"_blank\" rel=\"noopener\">Avira Free<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a><\/li>\n<\/ul><p>\n\n\n<div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Make sure to update your antivirus software before running a scan.<\/p>\n                <\/div>\n\n\n\n<\/p><h2 class=\"wp-block-heading\" id=\"h-how-to-prevent-your-website-from-being-hacked-in-the-future\">How to Prevent Your Website From Being Hacked in the Future<\/h2><p>Congratulations, you should have recovered the hacked website by this point. Unfortunately, there&rsquo;s no guarantee that it won&rsquo;t be compromised again in the future. That said, there are ways to minimize the risk of cyber attacks.<\/p><p>Here are several <a href=\"\/tutorials\/how-to-secure-wordpress\">basic tips to protect your website<\/a> from various types of malware:<\/p><ul class=\"wp-block-list\">\n<li>Use <a href=\"\/cheap-web-hosting\">cheap web hosting<\/a> providers wisely.<\/li>\n\n\n\n<li>Remove outdated software you no longer need.<\/li>\n\n\n\n<li>Use strong passwords.<\/li>\n\n\n\n<li>Conduct <a href=\"\/tutorials\/website-security-audit\">website security audits<\/a> regularly.<\/li>\n\n\n\n<li>Perform regular backups of your website.<\/li>\n\n\n\n<li><a href=\"\/tutorials\/ssl-benefits\">Install an SSL certificate<\/a>.<\/li>\n\n\n\n<li>Limit login attempts.<\/li>\n\n\n\n<li>Enable two-factor authentication.<\/li>\n<\/ul><h3 class=\"wp-block-heading\" id=\"wordpress-security-checklist\">Download WordPress Security Checklist<\/h3><p>We&rsquo;ve also compiled a security checklist to help WordPress users improve their site&rsquo;s security measures.<\/p><p class=\"has-text-align-center\"><a href=\"https:\/\/assets.hostinger.com\/content\/tutorials\/pdf\/WordPress-Security-Checklist.pdf\" target=\"_blank\" rel=\"noopener\">Download WordPress security checklist<\/a><\/p><p>The practices may vary depending on your chosen content management system, but their purpose remains the same &#8210; to protect your data and the target audience&rsquo;s well-being.<\/p><h2 class=\"wp-block-heading\" id=\"h-how-to-communicate-a-security-incident-to-your-visitors\">How to Communicate a Security Incident to Your Visitors<\/h2><p>Aside from relying on the products and services you provide your visitors with, they also expect your brand to be able to protect their data. If your website is hacked, you risk losing trust and harming your brand&rsquo;s credibility.<\/p><p>That said, being transparent about security incidents is significantly better than hiding them from your target audience. Doing so might cause an outcry and hurt your brand, but you will warn them of the threat and minimize the damage on their end.<\/p><p>Plus, if you&rsquo;re subject to the GDPR law, you&rsquo;re legally obligated to disclose any data breaches that might jeopardize your customers&rsquo; data security.<\/p><p>If your site is compromised,<strong> make a formal announcement<\/strong> informing your audience about the data breach. If you have an email list, <strong>send a formal email<\/strong> containing the same information to your subscribers. Make sure it&rsquo;s plain and clear so that the customers with limited technical knowledge can still understand it.<\/p><p>The content of the announcement should <strong>explain the full extent of the breach<\/strong>, particularly the types of data that were leaked. Next, <strong>break down the remedial actions<\/strong> taken to mitigate the damage. The goal is to assure the audience that you take full responsibility for the incident and act with their best interests in mind.<\/p><p>End it with <strong>suggestions on how to protect your audience&rsquo;s personal data<\/strong> that might be affected by the data breach:<\/p><ul class=\"wp-block-list\">\n<li>Update any exposed login credentials and security questions across all platforms.<\/li>\n\n\n\n<li>Monitor accounts and credit reports.<\/li>\n\n\n\n<li>Sign up for two-factor authentication.<\/li>\n\n\n\n<li>Remove home address.<\/li>\n\n\n\n<li>File a report to search engines if any of their private information shows up on search results.<\/li>\n<\/ul><figure class=\"wp-block-image size-full\"><a class=\"hgr-tutorials-cta hgr-tutorials-cta-web-hosting\" href=\"\/web-hosting\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"300\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/public\" alt=\"Hostinger web hosting banner\" class=\"wp-image-98604\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/11\/Web-hosting_in-text-banner.png\/w=768,fit=scale-down 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2><p>The rapid evolution of cyber attacks is a major threat to any website on the web. If your website has been hacked, it&rsquo;s best to take immediate action and mitigate the damage.<\/p><p>Here&rsquo;s a recap on how to fix a hacked website:<\/p><ol class=\"wp-block-list\">\n<li>Change your passwords and review user access.<\/li>\n\n\n\n<li>Create a backup of the website.<\/li>\n\n\n\n<li>Trace back your actions to determine the exposed vulnerabilities.<\/li>\n\n\n\n<li>Investigate recent breaches online.<\/li>\n\n\n\n<li>Talk to your hosting provider to see if other users have also been affected.<\/li>\n\n\n\n<li>Investigate with Google Blocklist.<\/li>\n\n\n\n<li>Reset your <strong>.htaccess<\/strong> file.<\/li>\n\n\n\n<li>Examine the website and fix the vulnerabilities.<\/li>\n\n\n\n<li>Scan your computer with antivirus software.<\/li>\n<\/ol><p>We hope this article has helped you recover your hacked website. If you&rsquo;re a Hostinger user, feel free to contact our support team if you have any security questions or concerns. <\/p><h2 class=\"wp-block-heading\" id=\"hacked-website-faq\">Hacked Website FAQ<\/h2><div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1645182375419\"><h3 class=\"schema-faq-question\">Can a Hacked Website Be Recovered?<\/h3> <p class=\"schema-faq-answer\">Yes, you can recover a hacked website by purging the malware and restoring a backup file. However, the process is rather technical. We recommend hiring a cyber security expert if you&rsquo;re not confident in your technical skills to prevent further damage to the website.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1645182398426\"><h3 class=\"schema-faq-question\">How Do Hackers Get Into a Website?<\/h3> <p class=\"schema-faq-answer\">In most cases, hackers gain access to websites through social engineering (persuading users to perform certain actions), brute-force attacks (cracking users&rsquo; passwords), and software vulnerabilities (code injection and malware). For more details, check out our article on <a href=\"\/tutorials\/how-websites-are-hacked\">how websites are hacked<\/a>.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1645182420806\"><h3 class=\"schema-faq-question\">Can a Hacker Be Traced?<\/h3> <p class=\"schema-faq-answer\">Often, seasoned hackers generally work over Tor, VPNs, or a public network to conceal their identity.<br><br>In most cases, hackers get caught because they make careless mistakes, use the same code on multiple hacks, and brag about their actions on online forums.<\/p> <\/div> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>The rapid evolution of technology coincides with the rising number of cybersecurity threats. With 30,000 websites falling victim to hackers [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"\/tutorials\/how-to-diagnose-and-fix-a-hacked-website\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":115,"featured_media":51690,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_title":"Complete Guide for Hacked Websites: How to Fix and Prevent It","rank_math_description":"Read on as we share 10 tips on dealing with a hacked website \u2013 from changing your passwords to clearing malware.","rank_math_focus_keyword":"hacked website","footnotes":""},"categories":[22628,22630],"tags":[],"class_list":["post-46215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting","category-technical-aspects"],"hreflangs":[{"locale":"en-US","link":"https:\/\/www.hostinger.com\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-UK","link":"https:\/\/www.hostinger.com\/uk\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-MY","link":"https:\/\/www.hostinger.com\/my\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-PH","link":"https:\/\/www.hostinger.com\/ph\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-IN","link":"https:\/\/www.hostinger.com\/in\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-CA","link":"https:\/\/www.hostinger.com\/ca\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-AU","link":"https:\/\/www.hostinger.com\/au\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0},{"locale":"en-NG","link":"https:\/\/www.hostinger.com\/ng\/tutorials\/how-to-diagnose-and-fix-a-hacked-website","default":0}],"_links":{"self":[{"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/posts\/46215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/comments?post=46215"}],"version-history":[{"count":43,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/posts\/46215\/revisions"}],"predecessor-version":[{"id":140441,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/posts\/46215\/revisions\/140441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/media\/51690"}],"wp:attachment":[{"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/media?parent=46215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/categories?post=46215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostinger.com\/tutorials\/wp-json\/wp\/v2\/tags?post=46215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}