{"id":37343,"date":"2025-10-24T11:29:49","date_gmt":"2025-10-24T11:29:49","guid":{"rendered":"https:\/\/www.hostingseekers.com\/blog\/?p=37343"},"modified":"2026-05-04T05:40:56","modified_gmt":"2026-05-04T05:40:56","slug":"what-is-ssh-port-and-how-to-change-on-linux","status":"publish","type":"post","link":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/","title":{"rendered":"What is the SSH Port &#038; How to Change SSH Port on Linux (Step-by-Step Guide)"},"content":{"rendered":"<p>Secure Shell (SSH) serves as a private, locked door that allows you to securely access and manage your Linux server from anywhere. By default, the SSH service listens on port 22, which is well-known and a typical target for automated attackers.<\/p>\n<p>Changing the port is analogous to moving that door down a quieter hallway, and while it will not render your system impervious to attack, it will reduce the number of unwanted knocks.<\/p>\n<p>In this guide, you will learn what an SSH port is, what the default SSH port is, how changing the port increases security, and how to change the SSH port on Linux safely and step by step.<\/p>\n<h2>What is the SSH Port?<\/h2>\n<p>The SSH port is the network port number on which the SSH server daemon (usually sshd) listens for incoming connections. In other words, when you type ssh user@hostname, your SSH client connects to a specific TCP port on the hosted server and establishes a secure, encrypted session. The port is like the &#8220;door&#8221; used to enter remote access.<\/p>\n<h2>What is the Default Port Used by the SSH Protocol?<\/h2>\n<p>Secure Shell uses Transmission Control Protocol (TCP) port by default, and it is commonly used with other protocols, such as Secure Copy (SCP) and Secure File Transfer Protocol (SFTP). Telnet uses port 23. SMTP uses port 25. HTTP uses port 80.<\/p>\n<p>This port is publicly known; automated bots frequently target it with brute-force login attempts. Changing it won&#8217;t make your server invincible, but it can significantly reduce unnecessary traffic and log clutter.<\/p>\n<h2>How to Change SSH Port on Linux<\/h2>\n<p>Follow these steps carefully to change the SSH port safely:<\/p>\n<h4>1. Access your server via SSH<\/h4>\n<p>Log in to your <a href=\"https:\/\/www.hostingseekers.com\/category\/web-hosting\/linux-hosting\">Linux server<\/a> using your current SSH setup. Example command:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">ssh username@server_ip<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>Ensure that your credentials (username\/password or SSH key) are working.<\/p>\n<h4>2. Backup the SSH configuration file<\/h4>\n<p>Before making changes, always create a backup of the configuration:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo cp \/etc\/ssh\/sshd_config \/etc\/ssh\/sshd_config.bak<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>This ensures you can revert if something goes wrong.<\/p>\n<h4>3. Edit the SSH daemon configuration<\/h4>\n<p>Open the file:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo nano \/etc\/ssh\/sshd_config<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>Find the line that says:<\/p>\n<p>#Port 22<\/p>\n<p>Un-comment it (remove #) and change 22 to your desired port (for example, 61189). Save and exit.<\/p>\n<h4>4. Adjust firewall settings<\/h4>\n<p>You must open your new port in your firewall. Example using UFW:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo ufw allow 61189\/tcp<br \/>\nsudo ufw reload<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>If using another firewall method or control panel, apply the equivalent rule.<\/p>\n<h4>5. Restart the SSH service<\/h4>\n<p>Apply the changes by restarting sshd:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo systemctl restart sshd<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>For older systems:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo service ssh restart<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<h4>6. Verify the new port is active<\/h4>\n<p>Use this command to check the listening ports:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">sudo ss -tuln | grep [new_port_number]<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>Or, with netstat:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">netstat -tuln | grep [new_port_number]<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>You should see sshd listening on your chosen port.<\/p>\n<h4>7. Test the SSH connection using the new port<\/h4>\n<p>Before closing your original session, open a new terminal and attempt:<\/p>\n<div class=\"copy-wrapper\">\n<h5 class=\"copy-tag\">ssh -p [new_port_number] username@server_ip<\/h5>\n<p><button class=\"copyButton\"><i class=\"fa-solid fa-copy\"><\/i><\/button><br \/>\n<span class=\"copy-message\">Copied!<\/span><\/p>\n<\/div>\n<p>Ensure you can connect successfully. Only once it&#8217;s confirmed should you close your prior SSH session.<\/p>\n<h2>The Benefits of Changing the SSH Port<\/h2>\n<h4>1. Reduces Automated Attacks (Bot Defense)<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Hackers use bots to scan the internet for servers running SSH on the default port 22, like enemy drones scouting for easy targets. Changing the port is like moving your base to a hidden location.<\/li>\n<li><strong>Why it helps:<\/strong> Bots typically target port 22 for brute-force attacks (trying endless password combos). A non-standard port (e.g., 2222) makes your server less visible, reducing the chance of being hit by these automated attacks.<\/li>\n<\/ul>\n<h4>2. Lowers Noise from Script Kiddies<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Amateur hackers (script kiddies) rely on simple tools that default to port 22, like shooting at a known enemy outpost. Switching ports is like camouflaging your position.<\/li>\n<li><strong>Why it helps:<\/strong> It filters out low-skill attackers who don&#8217;t bother scanning other ports, letting you focus defenses on more serious threats.<\/li>\n<\/ul>\n<h4>3. Improves Log Clarity (Better Intel)<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Server logs are your battlefield reports. If port 22 is swamped with bot attacks, it&#8217;s like radio chatter drowning out real intel. A custom port keeps logs cleaner.<\/li>\n<li><strong>Why it helps:<\/strong> Fewer junk connection attempts mean you can spot real threats faster, making monitoring and incident response more effective.<\/li>\n<\/ul>\n<h4>4. Deters Casual Reconnaissance<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Hackers often probe port 22 to map targets, like spies scouting enemy camps. A non-standard port is like operating behind a smokescreen.<\/li>\n<li><strong>Why it helps:<\/strong> It forces attackers to work harder to find your SSH service, discourages casual scans, and reduces your server&#8217;s exposure.<\/li>\n<\/ul>\n<h4>5. Works with Firewalls for Stronger Defenses<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Pairing a custom port with firewall rules is like fortifying your base with extra walls and guard towers.<\/li>\n<li><strong>Why it helps:<\/strong> You can configure firewalls to allow SSH only on the new port, blocking port 22 entirely, which adds another layer of protection against unauthorized access.<\/li>\n<\/ul>\n<h4>6. Avoids ISP or Network Restrictions<\/h4>\n<ul>\n<li><strong>What it means:<\/strong> Some networks or ISPs block port 22 to control traffic, like roadblocks on a supply route. A custom port is like taking a back road.<\/li>\n<li><strong>Why it helps:<\/strong> It ensures you can still connect to your server even if port 22 is restricted, keeping your operations running smoothly.<\/li>\n<\/ul>\n<h2>What Are Valid Ports to Use for SSH?<\/h2>\n<ul>\n<li>Port numbers range from 1\u201365535.<\/li>\n<li>Avoid 1\u20131023 (system-reserved).<\/li>\n<li>Choose a port above 1024, such as 2200, 2222, or 22222.<\/li>\n<li>Ensure the port isn&#8217;t already used by another service and is allowed by your firewall.<\/li>\n<\/ul>\n<h2>Common SSH Port Configuration Mistakes<\/h2>\n<ul>\n<li>Forgetting to update firewall rules or security groups.<\/li>\n<li>Restarting SSH before verifying access on the new port.<\/li>\n<li>Using a port already assigned to another service.<\/li>\n<li>Relying only on obscurity, a changed port should complement, not replace, strong authentication.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>Altering your SSH port is an easy and practical way to decrease your risk of automated attacks. It won&#8217;t completely protect you, but it will add one more complication for potential attackers. When combined with key-based authentication, firewall rules, and updates, you will have a well-protected Linux environment.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h4>Q1. What is the port number for SSH?<\/h4>\n<p><strong>Ans. <\/strong>By default, SSH uses TCP port 22.<\/p>\n<h4>Q2. Can I use port 80 or 443 for SSH?<\/h4>\n<p><strong>Ans. <\/strong>Yes, but these are typically reserved for web traffic and may conflict with HTTP\/HTTPS services. So, it is not recommended.<\/p>\n<h4>Q3. What happens if I change my SSH port incorrectly?<\/h4>\n<p><strong>Ans. <\/strong>You may lose remote access. Always test the new port in a second session before closing the original.<\/p>\n<h4>Q4. What are some good custom ports for SSH?<\/h4>\n<p><strong>Ans. <\/strong>Ports above 1024 that are not used by other services, e.g., 2200, 2222, or 22222.<\/p>\n<h4>Q5. Does changing the SSH port improve security?<\/h4>\n<p><strong>Ans. <\/strong>Yes, it reduces brute-force noise but doesn&#8217;t replace strong authentication methods.<\/p>\n<h4>Q6. How do I check which port SSH is running on?<\/h4>\n<p><strong>Ans. <\/strong>Run:<\/p>\n<p>sudo ss -tuln | grep ssh<\/p>\n<p>sudo grep Port \/etc\/ssh\/sshd_config<\/p>\n<h4>Q7. What are valid ports to use for SSH?<\/h4>\n<p><strong>Ans. <\/strong>Any between 1 and 65535, but above 1024 is safest.<\/p>\n<h4>Q8. What is the default port used by the SSH protocol?<\/h4>\n<p><strong>Ans.<\/strong> Port 22.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure Shell (SSH) serves as a private, locked door that allows you to securely access and manage your Linux server&hellip; <a class=\"more-link\" href=\"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/\">Continue reading <span class=\"screen-reader-text\">What is the SSH Port &#038; How to Change SSH Port on Linux (Step-by-Step Guide)<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":37349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-37343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is the SSH Port &amp; How to Change SSH Port on Linux<\/title>\n<meta name=\"description\" content=\"Learn what the SSH port is, the default SSH port number, and how to change it on Linux safely. Secure your server and reduce attack risks in minutes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the SSH Port &amp; How to Change SSH Port on Linux\" \/>\n<meta property=\"og:description\" content=\"Learn what the SSH port is, the default SSH port number, and how to change it on Linux safely. Secure your server and reduce attack risks in minutes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostingseekers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hostingseekers\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-24T11:29:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T05:40:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"manvinder Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Hostingseekers1\" \/>\n<meta name=\"twitter:site\" content=\"@Hostingseekers1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"manvinder Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is the SSH Port & How to Change SSH Port on Linux","description":"Learn what the SSH port is, the default SSH port number, and how to change it on Linux safely. Secure your server and reduce attack risks in minutes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/","og_locale":"en_US","og_type":"article","og_title":"What is the SSH Port & How to Change SSH Port on Linux","og_description":"Learn what the SSH port is, the default SSH port number, and how to change it on Linux safely. Secure your server and reduce attack risks in minutes.","og_url":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/","og_site_name":"Hostingseekers","article_publisher":"https:\/\/www.facebook.com\/hostingseekers","article_published_time":"2025-10-24T11:29:49+00:00","article_modified_time":"2026-05-04T05:40:56+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp","type":"image\/webp"}],"author":"manvinder Singh","twitter_card":"summary_large_image","twitter_creator":"@Hostingseekers1","twitter_site":"@Hostingseekers1","twitter_misc":{"Written by":"manvinder Singh","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#article","isPartOf":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/"},"author":{"name":"manvinder Singh","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/person\/76bc9258cab3c5bfe0237d3e290b13ea"},"headline":"What is the SSH Port &#038; How to Change SSH Port on Linux (Step-by-Step Guide)","datePublished":"2025-10-24T11:29:49+00:00","dateModified":"2026-05-04T05:40:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/"},"wordCount":1193,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp","articleSection":["IT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/","url":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/","name":"What is the SSH Port & How to Change SSH Port on Linux","isPartOf":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp","datePublished":"2025-10-24T11:29:49+00:00","dateModified":"2026-05-04T05:40:56+00:00","description":"Learn what the SSH port is, the default SSH port number, and how to change it on Linux safely. Secure your server and reduce attack risks in minutes.","breadcrumb":{"@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#primaryimage","url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp","contentUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/10\/Frame-1171279557.webp","width":1200,"height":675,"caption":"What is the SSH Port"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostingseekers.com\/blog\/what-is-ssh-port-and-how-to-change-on-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostingseekers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is the SSH Port &#038; How to Change SSH Port on Linux (Step-by-Step Guide)"}]},{"@type":"WebSite","@id":"https:\/\/www.hostingseekers.com\/blog\/#website","url":"https:\/\/www.hostingseekers.com\/blog\/","name":"Hostingseekers","description":"Hostingseekers","publisher":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostingseekers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostingseekers.com\/blog\/#organization","name":"HostingSeekers Pvt. Ltd.","url":"https:\/\/www.hostingseekers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/04\/Hosting-Seekers-Logo.png","contentUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/04\/Hosting-Seekers-Logo.png","width":451,"height":520,"caption":"HostingSeekers Pvt. Ltd."},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hostingseekers","https:\/\/x.com\/Hostingseekers1","https:\/\/www.linkedin.com\/company\/hostingseekers\/","https:\/\/www.instagram.com\/hostingseekers\/"]},{"@type":"Person","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/person\/76bc9258cab3c5bfe0237d3e290b13ea","name":"manvinder Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","caption":"manvinder Singh"},"description":"Manvinder Singh is the Founder and CEO of HostingSeekers, an award-winning go-to-directory for all things hosting. Our team conducts extensive research to filter the top solution providers, enabling visitors to effortlessly pick the one that perfectly suits their needs. We are one of the fastest growing web directories, with 500+ global companies currently listed on our platform.","sameAs":["https:\/\/www.hostingseekers.com","https:\/\/www.linkedin.com\/in\/manvinder-singh\/"],"url":"https:\/\/www.hostingseekers.com\/blog\/author\/seodeveloper\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/37343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/comments?post=37343"}],"version-history":[{"count":9,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/37343\/revisions"}],"predecessor-version":[{"id":38881,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/37343\/revisions\/38881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/media\/37349"}],"wp:attachment":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/media?parent=37343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/categories?post=37343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/tags?post=37343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}