{"id":3202,"date":"2026-03-09T04:48:01","date_gmt":"2026-03-09T04:48:01","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=3202"},"modified":"2026-03-09T04:48:05","modified_gmt":"2026-03-09T04:48:05","slug":"how-to-block-an-ip-address-in-whm-using-cphulk","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/","title":{"rendered":"How to Block an IP Address in WHM using cPHulk"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>cPHulk is a security feature in WHM (WebHost Manager) that helps protect the server from brute-force login attacks. Administrators can use cPHulk to block suspicious IP addresses that attempt repeated login failures to services like cPanel, WHM, SSH, FTP, or email.<\/p>\n\n\n\n<p>This guide explains how to manually block an IP address using cPHulk in WHM.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Steps to Block an IP Address using cPHulk<\/h3>\n\n\n\n<p><strong>1.<\/strong> <strong>Log in to WHM<\/strong><\/p>\n\n\n\n<p> Access WHM using the following URL and Log in with the root credentials.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>https:\/\/server-ip:2087<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>2. Navigate to cPHulk Brute Force Protection<\/strong><\/p>\n\n\n\n<p>In the WHM search bar, type<em><strong> <\/strong><\/em>cPHulk.<\/p>\n\n\n\n<p>Click cPHulk Brute Force Protection under Security Center.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"728\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-1024x728.png\" alt=\"\" class=\"wp-image-3215\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-1024x728.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-300x213.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-768x546.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-150x107.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb.png 1152w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>3. Open Blacklist Management<\/strong><\/p>\n\n\n\n<p>Inside the cPHulk interface, click the Blacklist Management tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-1024x358.png\" alt=\"\" class=\"wp-image-3205\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-1024x358.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-300x105.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-768x268.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-1536x537.png 1536w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8-150x52.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-8.png 1603w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>4. Add the IP Address to the Blacklist<\/strong><\/p>\n\n\n\n<p>Enter the IP address you want to block in the Blacklist an IP Address field.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"652\" height=\"511\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-9.png\" alt=\"\" class=\"wp-image-3206\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-9.png 652w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-9-300x235.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/image-9-150x118.png 150w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><\/figure>\n\n\n\n<p><strong>5. Add a Reason (Optional )<\/strong><\/p>\n\n\n\n<p>You can add a note describing why the IP is being blocked.<\/p>\n\n\n\n<p><strong>6. Save the Changes<\/strong><\/p>\n\n\n\n<p>Click Add to Blacklist.<\/p>\n\n\n\n<p>The IP address will now be permanently blocked from accessing services protected by cPHulk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Using cPHulk in WHM helps administrators prevent unauthorized access attempts by blocking malicious IP addresses. Regular monitoring of login attempts and updating the blacklist can significantly improve server security.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction cPHulk is a security feature in WHM (WebHost Manager) that helps protect the server from brute-force login attacks. Administrators can use cPHulk to block suspicious IP addresses that attempt repeated login failures to services like cPanel, WHM, SSH, FTP, or email. This guide explains how to manually block an IP address using cPHulk in ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3202","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction cPHulk is a security feature in WHM (WebHost Manager) that helps protect the server from brute-force login attacks. Administrators can use cPHulk to block suspicious IP addresses that attempt repeated login failures to services like cPanel, WHM, SSH, FTP, or email. This guide explains how to manually block an IP address using cPHulk in ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-09T04:48:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T04:48:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"819\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"kaviya d\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kaviya d\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/\"},\"author\":{\"name\":\"kaviya d\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/82401b0672a0a481fa04646559e798af\"},\"headline\":\"How to Block an IP Address in WHM using cPHulk\",\"datePublished\":\"2026-03-09T04:48:01+00:00\",\"dateModified\":\"2026-03-09T04:48:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/\"},\"wordCount\":215,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/kb-1024x728.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/\",\"name\":\"How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/kb-1024x728.png\",\"datePublished\":\"2026-03-09T04:48:01+00:00\",\"dateModified\":\"2026-03-09T04:48:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/82401b0672a0a481fa04646559e798af\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/kb.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/kb.png\",\"width\":1152,\"height\":819},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2026\\\/03\\\/09\\\/how-to-block-an-ip-address-in-whm-using-cphulk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Block an IP Address in WHM using cPHulk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/82401b0672a0a481fa04646559e798af\",\"name\":\"kaviya d\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g\",\"caption\":\"kaviya d\"},\"sameAs\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-admin\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/kaviya\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/","og_locale":"en_US","og_type":"article","og_title":"How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base","og_description":"Introduction cPHulk is a security feature in WHM (WebHost Manager) that helps protect the server from brute-force login attacks. Administrators can use cPHulk to block suspicious IP addresses that attempt repeated login failures to services like cPanel, WHM, SSH, FTP, or email. This guide explains how to manually block an IP address using cPHulk in ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2026-03-09T04:48:01+00:00","article_modified_time":"2026-03-09T04:48:05+00:00","og_image":[{"width":1152,"height":819,"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb.png","type":"image\/png"}],"author":"kaviya d","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kaviya d","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/"},"author":{"name":"kaviya d","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/82401b0672a0a481fa04646559e798af"},"headline":"How to Block an IP Address in WHM using cPHulk","datePublished":"2026-03-09T04:48:01+00:00","dateModified":"2026-03-09T04:48:05+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/"},"wordCount":215,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-1024x728.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/","name":"How to Block an IP Address in WHM using cPHulk - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb-1024x728.png","datePublished":"2026-03-09T04:48:01+00:00","dateModified":"2026-03-09T04:48:05+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/82401b0672a0a481fa04646559e798af"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb.png","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2026\/03\/kb.png","width":1152,"height":819},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2026\/03\/09\/how-to-block-an-ip-address-in-whm-using-cphulk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to Block an IP Address in WHM using cPHulk"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/82401b0672a0a481fa04646559e798af","name":"kaviya d","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88b1f9aa6c79d91f44972e86b6f0b3f8acc3bdb14260d73705e85a1968631cd8?s=96&d=mm&r=g","caption":"kaviya d"},"sameAs":["https:\/\/pheonixsolutions.com\/knowledge-base\/wp-admin"],"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/kaviya\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=3202"}],"version-history":[{"count":3,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3202\/revisions"}],"predecessor-version":[{"id":3217,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/3202\/revisions\/3217"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=3202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=3202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=3202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}