{"id":51023,"date":"2025-09-27T14:49:12","date_gmt":"2025-09-27T11:49:12","guid":{"rendered":"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/"},"modified":"2025-09-27T14:49:13","modified_gmt":"2025-09-27T11:49:13","slug":"security-features-of-shared-in-hosting","status":"publish","type":"post","link":"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/","title":{"rendered":"Security Features of Shared in Hosting"},"content":{"rendered":"<p><\/p>\n<article><\/p>\n<p>If your <a href=\"https:\/\/www.hostinger.com\/website-builder\" target=\"_blank\" rel=\"noopener\">website<\/a> runs on <a href=\"https:\/\/infinitydomainhosting.com\/web-hosting.php\">Shared Hosting<\/a>, it&#8217;s normal to wonder how safe your site is when other sites share the same server. This article walks through the typical security features hosts provide, where the risks remain, and practical steps you can take to tighten security.<\/p>\n<p><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Why_security_matters_on_shared_hosting\" >Why security matters on shared hosting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Common_built-in_security_features\" >Common built-in security features<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Account_isolation\" >Account isolation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Firewall_and_Web_Application_Firewall_WAF\" >Firewall and Web Application Firewall (WAF)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Malware_scanning_and_cleanup\" >Malware scanning and cleanup<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Automatic_backups\" >Automatic backups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#ssltls_support\" >ssl\/tls support<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Secure_access_methods_sftpssh\" >Secure access methods (sftp\/ssh)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Login_protection_and_two-factor_authentication_2FA\" >Login protection and two-factor authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Patch_management_and_OS_updates\" >Patch management and OS updates<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Email_security_SPF_DKIM_DMARC\" >Email security (SPF, DKIM, DMARC)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Monitoring_and_intrusion_detection\" >Monitoring and intrusion detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Resource_limits_and_quotas\" >Resource limits and quotas<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Limits_and_risks_of_shared_hosting_security\" >Limits and risks of shared hosting security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#How_to_improve_security_on_shared_hosting_practical_steps\" >How to improve security on shared hosting , practical steps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Questions_to_ask_before_you_sign_up\" >Questions to ask before you sign up<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/infinitydomainhosting.com\/kb\/security-features-of-shared-in-hosting\/#Final_summary\" >Final summary<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Why_security_matters_on_shared_hosting\"><\/span>Why security matters on <a href=\"https:\/\/www.a2hosting.com\/web-hosting\/\" target=\"_blank\" rel=\"noopener\">shared hosting<\/a><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Shared <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> is affordable because many accounts share one server and <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ip-address\" target=\"_blank\" rel=\"noopener\">ip address<\/a>. That setup makes basic protection essential, since a problem on one account can affect others. Understanding the <a href=\"https:\/\/www.a2hosting.com\/\" target=\"_blank\" rel=\"noopener\">host<\/a>&#8216;s security tools helps you choose a provider and protect your site effectively.<\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_built-in_security_features\"><\/span>Common built-in security features<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Most reputable shared hosts include a core set of protections. Here are the ones that matter most.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Account_isolation\"><\/span>Account isolation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Good hosts limit what accounts can see and access on the same server. Techniques include chroot jails, containerization, or tools like CageFS. Isolation reduces the risk that a compromised site lets an attacker reach other accounts.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Firewall_and_Web_Application_Firewall_WAF\"><\/span>Firewall and Web Application Firewall (WAF)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Network firewalls block obvious attacks at the server edge, while a WAF filters malicious requests aimed at web apps (SQL injection, XSS, etc.). Some hosts offer a <a href=\"https:\/\/www.a2hosting.com\/wordpress-hosting\/managed\/\" target=\"_blank\" rel=\"noopener\">managed<\/a> WAF that sits in front of your site.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Malware_scanning_and_cleanup\"><\/span>Malware scanning and cleanup<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Automated scanners look for known malware and suspicious files. Premium plans often include removal or support for cleanup if malware is found.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Automatic_backups\"><\/span>Automatic backups<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Regular backups let you restore a clean copy after an incident. Check backup frequency, retention length, and whether backups are stored off-site.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"ssltls_support\"><\/span><a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ssl\" target=\"_blank\" rel=\"noopener\">ssl<\/a>\/<a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-tls\" target=\"_blank\" rel=\"noopener\">tls<\/a> support<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Free or paid <a href=\"https:\/\/www.hostinger.com\/tutorials\/types-of-ssl-certificate\" target=\"_blank\" rel=\"noopener\">ssl certificates<\/a> are usually available. <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ssl\" target=\"_blank\" rel=\"noopener\">https<\/a> encrypts data in transit and is a basic requirement for modern sites.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Secure_access_methods_sftpssh\"><\/span>Secure access methods (<a href=\"https:\/\/www.hostinger.com\/tutorials\/how-to-use-sftp-to-safely-transfer-files\/\" target=\"_blank\" rel=\"noopener\">sftp<\/a>\/<a href=\"https:\/\/www.a2hosting.com\/kb\/getting-started-guide\/accessing-your-account\/using-ssh-secure-shell\/\" target=\"_blank\" rel=\"noopener\">ssh<\/a>)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>SFTP or <a href=\"https:\/\/www.a2hosting.com\/kb\/getting-started-guide\/accessing-your-account\/using-ssh-secure-shell\/\" target=\"_blank\" rel=\"noopener\">ssh<\/a> access replaces insecure <a href=\"https:\/\/www.hostinger.com\/tutorials\/what-is-ftp\" target=\"_blank\" rel=\"noopener\">ftp<\/a> and prevents credentials from being intercepted. Hosts often allow disabling FTP entirely.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Login_protection_and_two-factor_authentication_2FA\"><\/span>Login protection and two-factor authentication (<a href=\"https:\/\/infinitydomainhosting.com\/index.php?rp=\/knowledgebase\/112\/How-to-enableordisable-two-factor-authentication-in-cPanel.html\">2FA<\/a>)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Limits on login attempts, IP blocking, and 2FA for control panels add strong defenses against brute-force attacks and stolen passwords.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Patch_management_and_OS_updates\"><\/span>Patch management and OS updates<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Hosts are responsible for updating server software and applying security patches. Timely patching reduces risk from known vulnerabilities.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Email_security_SPF_DKIM_DMARC\"><\/span>Email security (SPF, DKIM, DMARC)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Mail settings help prevent spoofing and improve deliverability. Hosts can provide tools and guidance to set these records correctly.<\/p>\n<p><!--KB_CAT_BLOCK--><\/p>\n<figure class=\"kb-cat-placeholder\" style=\"margin:1.75rem 0;display:block;\">\n<div class=\"kb-cat-wrap\" style=\"position:relative; overflow:hidden; border-radius:12px; box-shadow:0 10px 36px rgba(0,0,0,0.14);\"><img src=\"https:\/\/infinitydomainhosting.com\/kb\/assets\/img\/cat-default.webp\" alt=\"Security Features of Shared in Hosting\" loading=\"lazy\" decoding=\"async\" style=\"max-width:100%;height:auto;display:block;border-radius:12px;box-shadow:0 8px 28px rgba(0,0,0,0.12);\" \/><\/p>\n<div class=\"kb-cat-gradient\" style=\"position:absolute; inset:0; background:linear-gradient(180deg, rgba(9,23,60,0.66) 0%, rgba(11,30,70,0.45) 40%, rgba(11,30,70,0.15) 100%);\"><\/div>\n<div class=\"kb-cat-textbox\" style=\"position:absolute; inset:auto 5% 7% 5%; color:#fff; text-align:center; display:flex; flex-direction:column; gap:.4rem; align-items:center; justify-content:flex-end;\">\n<div class=\"kb-cat-title\" style=\"font-weight:800; font-size:clamp(20px,3.6vw,34px); line-height:1.2; letter-spacing:.2px; text-shadow:0 1px 2px rgba(0,0,0,.35);\">Security Features of Shared in Hosting<\/div>\n<div class=\"kb-cat-meta\" style=\"opacity:1; font-weight:600; font-size:clamp(13px,2.6vw,16px); line-height:1.45; text-shadow:0 1px 2px rgba(0,0,0,.28);\">If your website runs on Shared Hosting, it&#039;s normal to wonder how safe your site is when other sites share the same server. This article walks through the typical security\u2026<\/div>\n<div class=\"kb-cat-desc\" style=\"opacity:1; font-weight:500; font-size:clamp(12px,2.4vw,15px); line-height:1.5; max-width:900px; text-wrap:balance; text-shadow:0 1px 2px rgba(0,0,0,.25);\">Computer Security<\/div>\n<\/div>\n<\/div>\n<\/figure>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Monitoring_and_intrusion_detection\"><\/span>Monitoring and intrusion detection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>Many providers run monitoring systems that alert on unusual activity, failed logins, or file changes. Some offer proactive intrusion detection services.<\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Resource_limits_and_quotas\"><\/span>Resource limits and quotas<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>CPU, memory, and process limits help stop one compromised account from exhausting the server and affecting others.<\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Limits_and_risks_of_shared_hosting_security\"><\/span>Limits and risks of shared <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Even with strong <a href=\"https:\/\/www.a2hosting.com\/\" target=\"_blank\" rel=\"noopener\">host<\/a> protections, shared <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> has inherent limits you should know about.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>Shared IP address: If another site on the <a href=\"https:\/\/www.infinitivehost.com\/blog\/why-does-your-ip-get-blacklisted\/\" target=\"_blank\" rel=\"noopener\">ip is blacklisted<\/a>, email deliverability or reputation may suffer.<\/li>\n<p><\/p>\n<li>Less control: You can&#8217;t always change server-level settings or install specialized security software.<\/li>\n<p><\/p>\n<li>Plugin and application risk: Your CMS plugins or themes are common attack paths and require your attention.<\/li>\n<p><\/p>\n<li>Potential lateral movement: Poor isolation can allow attackers to move between accounts if the host\u2019s controls are weak.<\/li>\n<p>\n    <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_improve_security_on_shared_hosting_practical_steps\"><\/span>How to improve security on shared hosting , practical steps<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>You should treat hosting security as a partnership: hosts provide controls, but you must use them.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>Choose a reputable host with clear security practices and fast response times.<\/li>\n<p><\/p>\n<li>Enable SSL\/TLS and <a href=\"https:\/\/infinitydomainhosting.com\/kb\/htaccess-force-https\/\">force https<\/a> site-wide.<\/li>\n<p><\/p>\n<li>Use strong, unique passwords and enable 2FA for <a href=\"https:\/\/infinitydomainhosting.com\/kb\/how-to-use-cpanel-or-other-control-panel\/\">control panel<\/a> and CMS accounts.<\/li>\n<p><\/p>\n<li>Keep CMS, plugins, and themes updated. Remove plugins you don&#8217;t use.<\/li>\n<p><\/p>\n<li>Use SFTP or SSH instead of FTP, and avoid sharing credentials.<\/li>\n<p><\/p>\n<li>Install a CMS-level security plugin or a host-provided WAF for extra protection.<\/li>\n<p><\/p>\n<li>Set correct file permissions and avoid writable configuration files where possible.<\/li>\n<p><\/p>\n<li>Schedule and download backups to an external location you control.<\/li>\n<p><\/p>\n<li>Monitor your site for changes, unusual traffic spikes, or unauthorized file uploads.<\/li>\n<p><\/p>\n<li>Consider a <a href=\"https:\/\/infinitydomainhosting.com\/kb\/setting-up-a-content-delivery-network-cdn-for-website-performance-optimization\/\">CDN<\/a> or external WAF (Cloudflare, Fastly) for <a href=\"https:\/\/support.hostinger.com\/en\/articles\/5634639-what-is-a-ddos-attack-and-how-to-prevent-it\" target=\"_blank\" rel=\"noopener\">ddos<\/a> and extra filtering.<\/li>\n<p>\n    <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Questions_to_ask_before_you_sign_up\"><\/span>Questions to ask before you sign up<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Asking the right questions helps you compare hosts on security, not just price.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>How do you isolate accounts on shared servers?<\/li>\n<p><\/p>\n<li>Do you provide a WAF and DDoS protection? Is it included or paid?<\/li>\n<p><\/p>\n<li>How often are servers patched and updated?<\/li>\n<p><\/p>\n<li>What is the backup schedule and how do I restore files?<\/li>\n<p><\/p>\n<li>Do you offer malware scanning and cleanup services?<\/li>\n<p><\/p>\n<li>Is 2FA available for the control panel and hosting account?<\/li>\n<p><\/p>\n<li>Can I use SFTP\/SSH, and can FTP be disabled?<\/li>\n<p><\/p>\n<li>How quickly does support respond to security incidents?<\/li>\n<p><\/p>\n<li>Do you provide access logs and security event reports?<\/li>\n<p>\n    <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Final_summary\"><\/span>Final summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>Shared hosting can be secure when your provider offers solid isolation, firewalls, patching, backups, and monitoring. However, shared environments come with limits: you have less control and the actions of other customers can sometimes affect you. Reduce your risk by choosing a trustworthy host, using strong credentials and 2FA, keeping software updated, enabling HTTPS, and keeping off-site backups. Those steps, combined with good hosting-level protections, make shared hosting a practical and safe option for many sites.<\/p>\n<p>\n  <\/article>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your website runs on Shared Hosting, it&#8217;s normal to wonder how safe your site is when other sites share the same&hellip;<\/p>\n","protected":false},"author":1,"featured_media":51024,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[88,86,4593,9,1,4594,3,5,10,4,11,8,2],"tags":[11573,10674,677,10591,10721,10866,11572,10668,328,1095,10671,262,581],"class_list":["post-51023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-hosting","category-computer-security","category-databases","category-domains","category-general","category-networking","category-php-scripts","category-seo","category-servers","category-ssl-certificates","category-support","category-website-security","category-wordpress","tag-account-isolation","tag-firewall","tag-hosting","tag-hosting-security","tag-malware-protection","tag-security-features","tag-security-features-of-shared-in-hosting","tag-server-security","tag-shared","tag-shared-hosting","tag-ssl-tls","tag-web-hosting","tag-website-security"],"_links":{"self":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/comments?post=51023"}],"version-history":[{"count":1,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51023\/revisions"}],"predecessor-version":[{"id":51025,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/51023\/revisions\/51025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media\/51024"}],"wp:attachment":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media?parent=51023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/categories?post=51023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/tags?post=51023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}