My Website Has Been Compromised and Disabled – What Happens Next?

Last updated: 21 December 2025

If you are reading this page, it means your website was detected performing malicious or abusive activity and has been temporarily disabled to protect our network and other customers.

We understand this can be stressful. This page explains why this happenswhat your options are, and how we can help you get back online safely.


Why was my site disabled?

Your website was disabled because it showed signs of compromise, such as:

  • malicious outbound connections
  • brute-force or scanning activity
  • malware files detected in the website files
  • reports from our upstream providers or security partners

When this happens, we must act quickly to prevent:

  • further damage to your website
  • blacklisting of server IP addresses
  • disruption to other customers

Disabling access is a temporary containment measure, not a punishment.


What does “disabled” mean?

In most cases:

  • your website will not be publicly accessible
  • email services are not affected
  • your data has not been deleted

The site is simply prevented from loading until the issue is resolved.


Your options to get back online

You have three main options, depending on your situation.


If you would like us to handle everything for you, we offer a WordPress Rescue Service, which includes:

  • full malware and backdoor cleanup
  • removal of malicious files and processes
  • WordPress core, plugin, and theme updates
  • security hardening to reduce future risk
  • verification before re-enabling the site

This is the fastest and safest way to get your site back online.

👉 Ideal if you are not technical or want peace of mind.


Option 2 – Reset and reinstall WordPress

If you prefer to start fresh:

  • we can reset the website document root
  • you reinstall WordPress from scratch
  • you restore content manually or from a clean backup
  • security plugins and updates must be applied before reactivation

👉 Suitable if the site is small or content can be easily recreated.


Option 3 – Clean the site yourself

If you choose to clean the site yourself:

  • all malware and suspicious files must be removed
  • WordPress core, plugins, and themes must be updated
  • basic security measures must be in place
  • the site will be reviewed before re-enabling

Please note: incomplete cleanups often result in re-infection.


What happens after cleanup?

Once cleanup or rebuilding is complete:

  1. you notify our support team
  2. we verify the site is no longer compromised
  3. public access is restored

Preventing this from happening again

After recovery, we strongly recommend:

  • keeping WordPress, plugins, and themes updated
  • using strong passwords and two-factor authentication
  • running a reputable WordPress security plugin
  • removing unused plugins and themes

You can read our full Minimum WordPress Security Requirements article for details.


Need help deciding?

If you are unsure which option is best for you, open a support ticket and we will be happy to advise based on:

  • site size
  • content importance
  • technical experience
  • budget

Final note

Website compromises are unfortunately common and not a reflection on you.

What matters most is resolving the issue properly and preventing a repeat.

We’re here to help you get back online safely.

Minimum WordPress Security Requirements

Last updated: 21 December 2025

To protect our network and our customers, all WordPress websites hosted with UK Cheapest must meet the minimum security requirements outlined below.

Websites that do not meet these requirements are at a significantly higher risk of being hacked and may be temporarily restricted if they pose a security or abuse risk.


Why this is required

WordPress is a popular platform and is frequently targeted by automated attacks.

Most compromises occur due to:

  • outdated WordPress core
  • vulnerable or abandoned plugins
  • weak passwords
  • lack of basic security protection

Once a site is compromised, it can be used to send spam, perform attacks, or host malicious content. These activities can result in service disruption or action by upstream providers.


Minimum security requirements (mandatory)

All WordPress installations must meet all of the following requirements.

1. Keep WordPress fully up to date

  • WordPress core must be kept on the latest stable version
  • All themes and plugins must be kept up to date
  • Any themes or plugins that are not actively used must be deleted, not just disabled

2. Use strong login credentials

  • Strong, unique passwords must be used for all WordPress admin accounts
  • Do not reuse passwords from other websites or services
  • Remove any unused admin or user accounts

3. Install a security plugin

A reputable WordPress security plugin must be installed and active.

Examples include (but are not limited to):

  • Wordfence
  • iThemes Security / Solid Security
  • All In One WP Security

The security plugin should provide basic protection such as login rate limiting and malware scanning.


4. Protect the login page

At least one of the following must be enabled:

  • login rate limiting
  • CAPTCHA
  • two-factor authentication (recommended)

This significantly reduces brute-force and credential-stuffing attacks.


5. XML-RPC protection

  • XML-RPC must be disabled if it is not required, or
  • protected via a security plugin

Unprotected XML-RPC is a common attack vector.


6. File and plugin hygiene

  • No executable files or custom binaries should exist in the website document root
  • Plugins and themes must only be installed from trusted sources
  • Pirated, nulled, or unverified plugins/themes are not permitted

If your site is compromised

If a WordPress site is found to be compromised or generating malicious activity:

  • the site may be temporarily restricted to prevent further abuse
  • cleanup or rebuilding will be required before the site can be re-enabled

UK Cheapest offers a WordPress Rescue Service for customers who would like us to professionally clean and secure their site.


Important note

Meeting these minimum requirements significantly reduces risk, but no website can be guaranteed to be completely immune from attack. Ongoing maintenance and updates are essential for long-term security.


Need help?

If you would like assistance securing your WordPress site, or if you are unsure whether your site meets these requirements, please open a support ticket and our team will be happy to advise.

DKIM Support Now Available in the Client Area DNS Manager

We’re pleased to announce that you can now add DKIM (DomainKeys Identified Mail) records directly through the Client Area DNS Manager for all parked domains.

What is DKIM?

DKIM is an industry-standard email authentication system that helps protect your domain name from being used for spam or phishing. It works by digitally signing outgoing messages so that receiving mail servers can verify they were genuinely sent from your authorised mail source.

When DKIM is active:

  • Your emails are less likely to be marked as spam
  • Recipients can trust that messages really came from you
  • Your domain reputation and deliverability improve

How it Works

Every DKIM setup uses two keys:

  • private key, stored safely on the mail server that sends your messages
  • public key, published in your domain’s DNS as a TXT record

When an email is sent, your mail server signs it with the private key. The receiving system checks that signature using the public key in your DNS.

Adding DKIM in the Client Area

If your mail service (for example Google Workspace, Microsoft 365, or your own server) provides you with a DKIM record, you can now publish it in just a few clicks.

  1. Log in to your Client Area at https://www.uk-cheapest.co.uk
  2. Go to Domains → Manage Domain → DNS Manager
  3. Add a new TXT record
    • Host/Name: the DKIM selector (for example, default._domainkey)
    • Value: the full DKIM record starting with v=DKIM1; k=rsa; p=…
  4. Save changes and allow a few minutes for DNS to update

Once published, your mail provider’s DKIM checks should confirm that your domain is correctly authenticated.

Frequently Asked Questions

1. Do I need to set up DKIM for my domain?

If you send email using your domain name, yes – DKIM is strongly recommended. It helps protect your domain’s reputation and improves email delivery by verifying that messages weren’t altered in transit.


2. Where do I get my DKIM record?

Your DKIM record is generated by your email provider or mail server. For example, Google Workspace, Microsoft 365, or your web hosting control panel will each provide a v=DKIM1; p= record that you can copy and paste into your DNS Manager.


3. How long does it take for DKIM to start working?

Once you add your DKIM record, it can take anywhere from a few minutes to a few hours for DNS propagation. After that, emails sent from your domain should show as “signed” when checked by online DKIM testers.


4. Can I use DKIM on a parked domain?

Yes. Even if your domain is parked, you can add DKIM records in advance or if you’re routing mail through another system. This is especially useful for protecting your brand from spoofed messages.


5. What if my DKIM record doesn’t validate?

Check that your record is added as a single TXT entry, with no extra spaces, quotes, or missing characters. If you’re unsure, open a support ticket – our team will review your DNS record and help you get it verified.

Need Help?

If you’re unsure which DKIM record to use or your provider’s verification fails, open a support ticket and our team will review your DNS settings for you.


Tip: It’s normal to paste a DKIM record generated on another mail system into your DNS – just make sure it’s copied exactly as provided.

For further guidance, visit your email provider’s DKIM documentation or contact us anytime through the Client Area Support Centre.

Introducing PingSentry: Complete Website Protection for Your Business

Your website is the digital front door to your business. But what happens when that door closes and you don’t even know it?

PingSentry is a comprehensive website monitoring service designed specifically for businesses like yours – offering uptime monitoring, SSL certificate protection, and domain expiry alerts all in one simple dashboard.

Why Your Business Needs Website Monitoring

Every minute your website is down costs your business money, trust, and customers:

  • Lost Sales: The average small business loses $200 per hour during downtime
  • Security Warnings: Expired SSL certificates trigger “Not Secure” browser warnings, causing customers to abandon their carts immediately
  • Domain Disasters: An expired domain means your website, email, and business identity can disappear overnight – or worse, be stolen by domain squatters

Three Essential Monitors Every Business Needs

1. Uptime Monitoring

  • Checks your website every minute, 24/7
  • Instant email alerts the moment your site goes down
  • See your complete uptime history at a glance
  • 99.9% of downtime caught within 60 seconds

2. SSL Certificate Protection

  • Monitors SSL certificate expiry dates
  • Alerts you 30 days before certificates expire
  • Supports custom SSL ports (Plesk, cPanel)
  • Protects your revenue, reputation, and Google rankings

3. Domain Expiry Alerts

  • Tracks domain expiration dates automatically
  • Multiple reminder alerts so you never forget
  • Works for .com, .co.uk, and 100+ TLDs
  • Prevents costly domain loss and squatting

Setup is Ridiculously Simple

  1. Add Your Website – Enter your URL (takes 30 seconds, no code required)
  2. We Monitor Everything – Automated checks run 24/7 across all three critical areas
  3. Get Instant Alerts – Receive email notifications the moment something goes wrong

No IT team required. No plugins. No complicated setup.

Pricing That Makes Sense

Free Forever Plan

  • 5 monitors
  • 5-minute checks
  • Email alerts
  • 1 public status page
  • Perfect for single-website businesses
  • No credit card required

Join Thousands of Businesses Already Protected

PingSentry is trusted by small businesses worldwide to keep their websites online, secure, and accessible. Our customers have prevented countless hours of downtime and protected millions in revenue.

Start protecting your business today – it takes just 2 minutes to set up, and our Free plan never expires.

👉 Get Started with PingSentry (Free, no credit card required)


Questions? Visit our help center at pingsentry.co/help or reach out to our support team

Custom Domain Email – Mailbox Support & Setup Guide

1. What is a Custom Domain Email Address / Mailbox?

Custom Domain Email Address (or mailbox) is an email account that uses your own website’s domain name instead of a generic email provider like Gmail or Yahoo. For example, instead of john.doe@gmail.com, you would have john.doe@yourdomain.co.uk.

This mailbox lets you send and receive emails using your custom domain, giving you greater control and professionalism.

How is this different from full email hosting?

A mailbox provided with your domain offers basic email capabilities, typically accessed via webmail or configured in email clients using POP or IMAP protocols. Full email hosting services usually provide additional features like calendars, contacts, advanced spam filtering, and larger storage limits.

Why use a domain email address?

  • Professionalism: Using a custom domain email looks more credible and trustworthy to your clients and contacts.
  • Branding: Every email you send promotes your brand and reinforces your online presence.
  • Control: You manage your email addresses and accounts, not a third-party free provider.
  • Customisation: Create personalised addresses like sales@yourdomain.co.uk or info@yourdomain.co.uk tailored to your business needs.

2. How to Get a Mailbox?

If you have a parked domain using our default nameservers, you’re eligible for a custom domain mailbox.

To get your mailbox:

  1. Log in to your Client Area.
  2. Navigate to Domains and select the domain name you want to use.
  3. In the sidebar menu, click on Custom Domain Email.
  4. Choose your desired mailbox product (Basic, Standard, or Pro).
  5. Follow the prompts to create your mailbox and set your mailbox name (prefix) and password.
  6. Once created, you can access your mailbox via Roundcube Webmail or configure it in your email client.

If you don’t see the option, ensure your domain is parked with our nameservers. Contact support if you need assistance.

3. How to Access Your Mailbox

You can access your custom domain mailbox in several convenient ways:

Using Roundcube Webmail

Access your mailbox directly from any web browser without needing to configure anything.

  • Webmail URL: https://webmail.ukc.uk
  • Enter your full email address (e.g., john.doe@yourdomain.co.uk) and password to log in.
  • Once logged in, you can send, receive, and manage your emails from anywhere with internet access.

Using Third-Party Email Clients

We recommend using Roundcube Webmail to send and receive emails through your mailbox, however, if you are up for the technical challenge then you might prefer to use unsupported desktop or mobile email applications like Microsoft Outlook, Thunderbird, or Apple Mail, you can configure them with the following settings:

  • Incoming Mail Server (IMAP): microlite1.com
    • Port: 993 (SSL/TLS)
  • Incoming Mail Server (POP3): microlite1.com
    • Port: 995 (SSL/TLS)
  • Outgoing Mail Server (SMTP): Use your Internet Service Provider’s SMTP server
  • Username: Your full mailbox name (e.g., john-doe-yourdomain-co-uk)
  • Password: Your mailbox password

Note: IMAP keeps your emails synced across all devices, while POP downloads emails to your device.

Mobile Access Tips

  • Use the built-in mail apps on your iPhone, Android, or tablet.
  • Enter the same server settings as above for IMAP or POP.
  • For quick access without setup, simply use Roundcube webmail via your mobile browser.

4. Setting or Resetting Your Mailbox Password

How to Change Your Mailbox Password

You can easily change your mailbox password anytime through your client area:

  1. Log in to your Client Area.
  2. Navigate to Domain Management and select your domain.
  3. Find the Mailbox or Custom Domain Email section.
  4. Use the provided option to set a new password for your mailbox.
  5. Save your changes – your new password will be effective immediately.

Password Requirements and Tips for Security

To keep your mailbox secure, your password must:

  • Be at least 8 characters long (maximum 16 characters).
  • Include at least one uppercase letter, one lowercase letter, and one number.
  • Not contain spaces or special invisible characters.
  • Avoid common or easily guessed passwords (e.g., “password123”).

Security Tips:

  • Use a unique password that you don’t use elsewhere.
  • Avoid using personal information like birthdays or names.
  • Change your password regularly to maintain security.

5. Mailbox Storage and Limits

Mailbox Sizes by Product Type

Each mailbox plan offers a different amount of storage to suit your needs:

  • Basic Mailbox: 1GB of storage – ideal for light email use.
  • Standard Mailbox: 5GB of storage with added spam protection – perfect for most small businesses.
  • Pro Mailbox: 10GB of storage with priority support – great for heavy email users and professionals.

What Happens If Your Mailbox Fills Up?

If your mailbox reaches its storage limit:

  • You may stop receiving new emails until you free up space by deleting old messages.
  • Some incoming emails might bounce back to the sender with a notification that your mailbox is full.
  • You will not be able to send emails until you free up space or upgrade your plan.

How to Upgrade Storage

If you find your mailbox storage isn’t enough:

  1. Log in to your Client Area.
  2. Navigate to your domain’s mailbox product.
  3. Choose an upgrade option to a higher storage plan.
  4. Complete the upgrade process – your storage will increase immediately or within a few minutes.
  5. Contact support if you need assistance with upgrading.

6. Spam Protection and Security

Spam Filtering with SpamAssassin

To help keep your mailbox clean and free from unwanted junk emails, we use SpamAssassin, a powerful spam filtering system running on our mail servers.

  • Incoming emails are automatically scanned and scored for spam-like characteristics.
  • Emails identified as spam are marked or moved to a spam/junk folder, helping you focus on important messages.

Malware Scanning with Maldet

In addition to spam filtering, we employ Maldet (Malware Detect) to scan all email attachments for malware and viruses.

  • Suspicious or harmful attachments are flagged or blocked to protect your device and data.

How to Report Spam or Phishing Emails

If you receive a suspicious email that bypasses the filters:

  • Do not open attachments or click links in the email.
  • Forward the email to our support team at abuse@uk-cheapest.co.uk with the subject “Spam/Phishing Report.”
  • Delete the email from your mailbox after reporting.

7. Configuring Email Forwarding

How to Forward Emails from Your Domain Email Address

If you have a parked domain using our default nameservers, you can easily forward emails sent to your domain’s aliases to any external mailbox of your choice. This is perfect if you want emails addressed to info@yourdomain.co.uk or sales@yourdomain.co.uk to be redirected to your main mailbox or another email account.

To set up email forwarding:

  1. Log in to your Client Area.
  2. Navigate to the domain management section for your parked domain.
  3. Locate the Email Forwarding section.
  4. Add or edit forwarding aliases by specifying the prefix (alias) and the destination email address.
  5. Save your changes – forwarding is typically active within minutes.

Limitations and Best Practices

  • There are no limits on the number of forwarding aliases you can create. Feel free to set up as many as you need.
  • Choose aliases carefully to minimise spam. Generic aliases like info or admin tend to attract more unsolicited mail.
  • Regularly review and update your forwarding rules to keep them relevant.
  • Forwarded emails depend on the external mailbox’s availability and configuration; ensure your destination mailbox is functioning correctly.