The document summarizes an analysis of compromised Linux servers. The author detected intrusion after logging in and seeing a previous login from an Italian IP address. Further investigation revealed unauthorized login attempts from other countries. Logs showed the intruder accessed the servers repeatedly over weeks. Processes and open ports indicated the presence of rootkits and backdoors. User accounts for the intruder were also found on the servers.