{"id":2164,"date":"2023-09-01T13:37:28","date_gmt":"2023-09-01T13:37:28","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=2164"},"modified":"2023-09-01T13:38:29","modified_gmt":"2023-09-01T13:38:29","slug":"how-to-deny-access-from-a-specific-ip-address","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/","title":{"rendered":"How to deny access from a specific IP address"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p><strong>Denying access from a specific IP address <\/strong><strong>will not allow to access the applications even if originating legitimate requests<\/strong><\/p>\n\n\n\n<p><strong>Prerequisite<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>cPanel credentials<\/strong><\/li>\n\n\n\n<li><strong>IP address\/domain that needs to be blocked<\/strong><\/li>\n<\/ol>\n\n\n\n<p><strong>Implementation<\/strong><\/p>\n\n\n\n<p><strong>Step 1: <\/strong><strong>&nbsp;Login to cPanel<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\" alt=\"\" \/><\/figure>\n\n\n\n<p><strong>Step 2: Click on <\/strong><strong>IP Blocker from the security section<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/0nbPXMWuQ9Heh9WHjps70Xqbqgog2FwZarTFawuKrwqrzai7QE2frFER2Bq3by8-RcWaYT-m8hR5EaPTtJqHI_fPo7VrWnn6CPvjJr-5MjpoVzZvrIVsFqfrsHxXMXrxuQaCtFyCZLfIBcearoUaIKw\" alt=\"\" \/><\/figure>\n\n\n\n<p><strong>Step 3: <\/strong><strong>Enter the domain name or IP address that needs to be blocked<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/Gx-4-QQByYKF5qVqDNa8qP0EHtJ6L6nklsWs_wlnXsodC7CUJi2o46_7NYBixbl6vVla2lORHpQYLEHyIpiO8S14TnHuDvXjAVPMuFlG2DSdlr-dLkbwZRG8ci-pax_XczMFOvWyPS1Y912eL6607UY\" alt=\"\" \/><\/figure>\n\n\n\n<p><strong>Step 4: <\/strong><strong>Click on \u201cADD\u201d and it will resolve the domain name to IP and enter in the blocked list<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Denying access from a specific IP address will not allow to access the applications even if originating legitimate requests Prerequisite Implementation Step 1: &nbsp;Login to cPanel Step 2: Click on IP Blocker from the security section Step 3: Enter the domain name or IP address that needs to be blocked Step 4: Click on ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33],"tags":[185],"class_list":["post-2164","post","type-post","status-publish","format-standard","hentry","category-whm","tag-deny-access"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to deny access from a specific IP address - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to deny access from a specific IP address - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction Denying access from a specific IP address will not allow to access the applications even if originating legitimate requests Prerequisite Implementation Step 1: &nbsp;Login to cPanel Step 2: Click on IP Blocker from the security section Step 3: Enter the domain name or IP address that needs to be blocked Step 4: Click on ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-01T13:37:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-01T13:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\" \/>\n<meta name=\"author\" content=\"meenakshi k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"meenakshi k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/\"},\"author\":{\"name\":\"meenakshi k\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\"},\"headline\":\"How to deny access from a specific IP address\",\"datePublished\":\"2023-09-01T13:37:28+00:00\",\"dateModified\":\"2023-09-01T13:38:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/\"},\"wordCount\":87,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh4.googleusercontent.com\\\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\",\"keywords\":[\"deny access\"],\"articleSection\":[\"WHM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/\",\"name\":\"How to deny access from a specific IP address - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh4.googleusercontent.com\\\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\",\"datePublished\":\"2023-09-01T13:37:28+00:00\",\"dateModified\":\"2023-09-01T13:38:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#primaryimage\",\"url\":\"https:\\\/\\\/lh4.googleusercontent.com\\\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\",\"contentUrl\":\"https:\\\/\\\/lh4.googleusercontent.com\\\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2023\\\/09\\\/01\\\/how-to-deny-access-from-a-specific-ip-address\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to deny access from a specific IP address\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/baf2a3c7578108699459ee9dfee7211f\",\"name\":\"meenakshi k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g\",\"caption\":\"meenakshi k\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/meenakshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to deny access from a specific IP address - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/","og_locale":"en_US","og_type":"article","og_title":"How to deny access from a specific IP address - PheonixSolutions Knowledge-Base","og_description":"Introduction Denying access from a specific IP address will not allow to access the applications even if originating legitimate requests Prerequisite Implementation Step 1: &nbsp;Login to cPanel Step 2: Click on IP Blocker from the security section Step 3: Enter the domain name or IP address that needs to be blocked Step 4: Click on ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2023-09-01T13:37:28+00:00","article_modified_time":"2023-09-01T13:38:29+00:00","og_image":[{"url":"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8","type":"","width":"","height":""}],"author":"meenakshi k","twitter_card":"summary_large_image","twitter_misc":{"Written by":"meenakshi k","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/"},"author":{"name":"meenakshi k","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f"},"headline":"How to deny access from a specific IP address","datePublished":"2023-09-01T13:37:28+00:00","dateModified":"2023-09-01T13:38:29+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/"},"wordCount":87,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8","keywords":["deny access"],"articleSection":["WHM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/","name":"How to deny access from a specific IP address - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8","datePublished":"2023-09-01T13:37:28+00:00","dateModified":"2023-09-01T13:38:29+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#primaryimage","url":"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8","contentUrl":"https:\/\/lh4.googleusercontent.com\/Z7gZpvUyVUco4sH8nAUyU1712URRU7HYl7CTN70lzizILC7rrB2lP0kuqr5w_0uKEqPMQD2q2SH70NDi5E0Y-4yL6ptuX2hGscGG8f_zM6wuXNCvRn6rbCuiZyhAb4terqxIF13BeXHuwAjmQQngrK8"},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2023\/09\/01\/how-to-deny-access-from-a-specific-ip-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to deny access from a specific IP address"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/baf2a3c7578108699459ee9dfee7211f","name":"meenakshi k","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&d=mm&r=g","caption":"meenakshi k"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/meenakshi\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=2164"}],"version-history":[{"count":1,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2164\/revisions"}],"predecessor-version":[{"id":2165,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2164\/revisions\/2165"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=2164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=2164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=2164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}