StackPatch is liveSee product

Back to StackPatch
Integration · Hostinger VPS

StackPatch on a Hostinger VPS

We run the live demo at /patch/audit/mss-vps on a Hostinger VPS, but the install + agent works identically on Hostinger. Default Hostinger distros: Ubuntu 24.04, Debian 12, AlmaLinux 9. Control panel: hPanel.

Install

# free anonymous quickscan
curl https://mindsparkstack.com/scan.sh | bash

# paid agent install (requires founder seat)
curl -fsSL https://mindsparkstack.com/install.sh | sudo bash -s -- --token spt_...

Source plain text at /scan.sh and /install.sh — read before piping.

Hostinger-specific notes

Monarx agent (pre-installed)

Hostinger ships every VPS with monarx-agent running — their on-host malware scanner. Default scope is /home/ and /var/www/ only. Won't conflict with StackPatch (we live in /srv/mindsparkstack/ and /var/lib/stackpatch/). Verify with systemctl status monarx-agent.

External network scanner

Hostinger separately scans VPS IPs from outside, fingerprinting service banners. Vulnerable service on a public port → VM stopped. Lesson: never expose admin web UIs (n8n, traefik dashboard, vault UI) on public ports. Use ufw status to audit.

hPanel restart vs API restart

Two ways: hPanel → VPS → Restart (90s), or POST /api/vps/v1/virtual-machines/{id}/restart with bearer token from hpanel.hostinger.com/profile/api. The API path enables autonomous recovery scripts.

Hostinger's default has UFW disabled

StackPatch's install script doesn't modify firewall rules. Wire it yourself if you haven't:

sudo ufw default deny incoming
sudo ufw allow 22/tcp
sudo ufw allow 80/tcp
sudo ufw allow 443/tcp
sudo ufw enable

Other VPS providers

Don't see your provider? StackPatch is provider-agnostic — it works on any Linux VPS (Linode, Vultr, Contabo, AWS Lightsail, Oracle Cloud free tier, etc). The agent is distro-aware, not provider-specific.

Free quickscan, no signup, 5 seconds

curl https://mindsparkstack.com/scan.sh | bash