A Wordpress security plugin notified me about login attempts to the Wordpress login but from localhost (127.0.01). This means the requests are triggered from my root server. The attempts were trying the username "admin". I believe this indicates a compromised server.
My question is: How can I identify the process or user who conducts these requests? I am using nginx as a web server. Is there a way to find the pid or process name from which the requests originate?