

What it scans
Pick one of four scopes:| Scope | Path | What’s there |
|---|---|---|
| Scan Mail | ~/mail/ | Stored email and attachments. |
| Scan Entire Home Directory | ~/ | Everything in your account. Slowest, most thorough. |
| Scan Public FTP Space | ~/public_ftp/ | Anonymous FTP uploads (rarely used in 2026). |
| Scan Public Web Space | ~/public_html/ | Site files. The most useful scope for “is my site compromised?” |
What it catches
ClamAV’s signature database is good at:- Known malware in PHP files (older WordPress shells, generic backdoors).
- Common email-borne viruses.
- Known infected binaries.
- Modern WordPress malware. Signatures lag behind real-world WP infection patterns. Today’s WP backdoors are often custom or obfuscated and slip past ClamAV.
- JavaScript injection. ClamAV scans for binary signatures, not behavioral or pattern-based JS analysis.
- Server-side compromises that don’t write malware to files. A backdoored cron, a database-injected script, or a runtime-only payload won’t show up.
What to do if the scanner finds something
Don't delete the file blindly
The hit might be a false positive, or removing one file might leave the rest of the infection in place. Note the path.
Take a JetBackup snapshot of the current state
Forensics first, cleanup second. See JetBackup.
Compare to a known-good copy
For WordPress core files, reinstall from the official zip. For plugins/themes, reinstall from the original source. Custom code: diff against the last clean backup.
Restore from a pre-infection backup
If you can identify when the infection happened, restoring is faster and safer than picking the malware out file by file. JetBackup retains 30 days of nightly snapshots; older incidents may not be recoverable.
Common questions
The scanner says clean, but my site is clearly hacked
The scanner says clean, but my site is clearly hacked
Trust the symptoms, not the scan. ClamAV signatures don’t catch modern WP-targeted malware reliably. Compare core files against a fresh WordPress install, audit
wp-content/uploads for any .php files (shouldn’t exist), check .htaccess for unfamiliar redirects, and check the database for injected admin users. If you’re not sure, restore from the most recent clean JetBackup snapshot.Scanning my home directory takes forever
Scanning my home directory takes forever
~/ includes everything: mail, FTP, every site, every backup, every log. For most “is my site hacked?” questions, Scan Public Web Space is sufficient and much faster.The scanner found a hit; is it a false positive?
The scanner found a hit; is it a false positive?
Sometimes. ClamAV occasionally flags legitimate files (especially packed JavaScript libraries) as malware. The signature name in the report tells you what it thinks the file is. Look the signature up; if it matches a known false positive class, ignore it. If it matches generic backdoor names, treat as real.
Can I run scans on a schedule?
Can I run scans on a schedule?
Not from this page. The cPanel UI runs scans interactively only. For scheduled scans, set up a cron job calling For serious malware monitoring, look into ImunifyAV or a dedicated WordPress security plugin; they’re better than scheduled ClamAV for modern threats.
clamscan directly, e.g.:
