{"id":8506,"date":"2020-05-22T16:44:45","date_gmt":"2020-05-22T13:44:45","guid":{"rendered":"https:\/\/unihost.com\/help\/?p=8506"},"modified":"2023-01-19T13:59:45","modified_gmt":"2023-01-19T10:59:45","slug":"how-to-secure-your-ssh-server","status":"publish","type":"post","link":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/","title":{"rendered":"How to Secure Your SSH Server"},"content":{"rendered":"<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">In this guide I will show how to secure your SSH server.<!--more--><\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. It is a secure alternative to the non-protected login protocols (such as telnet, rlogin) and insecure file transfer methods (such as FTP).<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">My test server was online for only two hours. When I logged in, I saw this message.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Last failed login: Fri May 22 12:51:07 CEST 2020 from 218.92.0.184 on ssh:notty<\/span><br \/><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">There were 718 failed login attempts since the last successful login.<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">I need to secure my server to avoid attacks.<\/span><\/p>\n<h2 style=\"text-align: center;\"><span style=\"font-size: 12pt; font-family: Ubuntu, sans-serif;\">Change the Default SSH Port<\/span><\/h2>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Using a non-standard port for SSH connection helps avoid automated attacks on your server.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">To change port SSH you need to edit sshd configuration file. In my case I will change default port 22 to custom 54321.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># nano \/etc\/ssh\/sshd_config<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8507 size-full\" src=\"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_pIMJWKT4.png\" alt=\"sshd_config\" width=\"619\" height=\"237\" \/ title=\"How to Secure Your SSH Server - Image 1\"><\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Uncomment the line and change port number, save the configuration and restart sshd service.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># systemctl restart sshd<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Verify that the SSH is listening on the port you specified by connecting to it.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># netstat -ntulp | grep ssh<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8509 size-full\" src=\"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_Eho_A1Tn.png\" alt=\"netstat\" width=\"733\" height=\"57\" \/ title=\"How to Secure Your SSH Server - Image 2\"><\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">SSH port has been successfully changed. To connect to the server with SSH custom port use the next command.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># ssh root@ip_address\u00a0 -p54321<\/span><\/pre>\n<h2 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Restrict SSH Access Using iptables<\/span><\/h2>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">You can restrict SSH connection to only allow authorized IP addresses.<\/span><br \/><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">To allow SSH connections only from 10.10.10.10 run the following command:<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -A INPUT -p tcp -m tcp --dport 54321 -s 10.10.10.10 -j ACCEPT<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">To disable SSH connection from all other hosts run the following command:<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables -A INPUT -p tcp -m tcp --dport 54321 -m state --state NEW -j DROP<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Save your new rules using the following command:<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># iptables-save &gt; \/etc\/sysconfig\/iptables<\/span><\/pre>\n<h2 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Use SSH Keys Instead of Passwords<\/span><\/h2>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Using passwords for SSH authentication is insecure. If one of your users sets a weak password, your server can be compromised. To avoid this, you can use ssh key for authentication without a password.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Please take a look at the guide &#8211; <a href=\"https:\/\/unihost.com\/help\/how-to-set-up-ssh-keys-on-centos-7\/\">How to set up SSH keys<\/a><\/span><\/p>\n<h2 style=\"text-align: center;\"><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Disable Password-Based Logins on Your Server<\/span><\/h2>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Password authentication in SSH is a big security risk if your user sets a weak password. If you are using SSH keys for SSH authentication, you can disable the server password authentication altogether.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">You need to edit sshd configuration file.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># nano \/etc\/ssh\/sshd_config<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8513 size-full\" src=\"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_KFJLdJbl.png\" alt=\"sshd_config\" width=\"588\" height=\"110\" \/ title=\"How to Secure Your SSH Server - Image 3\"><\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Find the line that contains the PasswordAuthentication and change it to &#8220;no&#8221;<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"><span style=\"color: #ff0000;\">Warning!<\/span> Before restarting the ssh daemon to take the changes into effect, be sure you have created and configured an SSH key to use for login.<\/span><\/p>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">Restart sshd service to apply the configuration.<\/span><\/p>\n<pre><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\"># systemctl restart sshd<\/span><\/pre>\n<p><span style=\"font-family: Ubuntu, sans-serif; font-size: 12pt;\">I showed you the basic security tips for an SSH server.<\/span><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guide I will show how to secure your SSH server.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[158],"tags":[457,600,87],"class_list":["post-8506","post","type-post","status-publish","format-standard","hentry","category-dedicated-servers","tag-centos-2","tag-security","tag-ssh"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure Your SSH Server - Unihost.FAQ<\/title>\n<meta name=\"description\" content=\"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Your SSH Server - Unihost.FAQ\" \/>\n<meta property=\"og:description\" content=\"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.FAQ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-22T13:44:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T10:59:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png\" \/>\n<meta name=\"author\" content=\"Unihost Support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Unihost Support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\"},\"author\":{\"name\":\"Unihost Support\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\"},\"headline\":\"How to Secure Your SSH Server\",\"datePublished\":\"2020-05-22T13:44:45+00:00\",\"dateModified\":\"2023-01-19T10:59:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\"},\"wordCount\":396,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png\",\"keywords\":[\"CentOS\",\"security\",\"SSH\"],\"articleSection\":[\"02. Dedicated servers\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\",\"url\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\",\"name\":\"How to Secure Your SSH Server - Unihost.FAQ\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/help\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png\",\"datePublished\":\"2020-05-22T13:44:45+00:00\",\"dateModified\":\"2023-01-19T10:59:45+00:00\",\"description\":\"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage\",\"url\":\"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_pIMJWKT4.png\",\"contentUrl\":\"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_pIMJWKT4.png\",\"width\":619,\"height\":237},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help\",\"item\":\"https:\/\/unihost.com\/help\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Secure Your SSH Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/help\/#website\",\"url\":\"https:\/\/unihost.com\/help\/\",\"name\":\"Unihost.FAQ\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/help\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/help\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/help\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/help\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\/\",\"https:\/\/x.com\/unihost\",\"https:\/\/www.instagram.com\/unihost\/?hl=en\",\"https:\/\/www.linkedin.com\/company\/unihost-com\",\"https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a\",\"name\":\"Unihost Support\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g\",\"caption\":\"Unihost Support\"},\"sameAs\":[\"https:\/\/unihost.com\/\"],\"url\":\"https:\/\/unihost.com\/help\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure Your SSH Server - Unihost.FAQ","description":"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure Your SSH Server - Unihost.FAQ","og_description":"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %","og_url":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/","og_site_name":"Unihost.FAQ","article_publisher":"https:\/\/www.facebook.com\/unihost\/","article_published_time":"2020-05-22T13:44:45+00:00","article_modified_time":"2023-01-19T10:59:45+00:00","og_image":[{"url":"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png","type":"","width":"","height":""}],"author":"Unihost Support","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Unihost Support","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/"},"author":{"name":"Unihost Support","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a"},"headline":"How to Secure Your SSH Server","datePublished":"2020-05-22T13:44:45+00:00","dateModified":"2023-01-19T10:59:45+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/"},"wordCount":396,"publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"image":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png","keywords":["CentOS","security","SSH"],"articleSection":["02. Dedicated servers"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/","url":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/","name":"How to Secure Your SSH Server - Unihost.FAQ","isPartOf":{"@id":"https:\/\/unihost.com\/help\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage"},"image":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/help\/wp-content\/uploads\/DM_220520_pIMJWKT4.png","datePublished":"2020-05-22T13:44:45+00:00","dateModified":"2023-01-19T10:59:45+00:00","description":"In this guide I will show how to secure your SSH server. \u2714 Change the Default SSH Port \u2714 Restrict SSH Access Using iptables \u2714 Use SSH Keys %","breadcrumb":{"@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#primaryimage","url":"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_pIMJWKT4.png","contentUrl":"https:\/\/unihost.com\/help\/minio.php?.\/DM_220520_pIMJWKT4.png","width":619,"height":237},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/help\/how-to-secure-your-ssh-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Help","item":"https:\/\/unihost.com\/help\/"},{"@type":"ListItem","position":3,"name":"How to Secure Your SSH Server"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/help\/#website","url":"https:\/\/unihost.com\/help\/","name":"Unihost.FAQ","description":"","publisher":{"@id":"https:\/\/unihost.com\/help\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/help\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/help\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/help\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/help\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost\/","https:\/\/x.com\/unihost","https:\/\/www.instagram.com\/unihost\/?hl=en","https:\/\/www.linkedin.com\/company\/unihost-com","https:\/\/www.youtube.com\/channel\/UCITKsxMDnslQY8brN3advgw"]},{"@type":"Person","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/bb5ae95f38577c920e6a7507888b715a","name":"Unihost Support","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/help\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0c9db17c2a0d93e8a0d5ac123f8c5db750ad4d3d5657369c0c4e480f5af77b8?s=96&d=mm&r=g","caption":"Unihost Support"},"sameAs":["https:\/\/unihost.com\/"],"url":"https:\/\/unihost.com\/help\/author\/support\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/8506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/comments?post=8506"}],"version-history":[{"count":6,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/8506\/revisions"}],"predecessor-version":[{"id":11227,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/posts\/8506\/revisions\/11227"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/media?parent=8506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/categories?post=8506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/help\/wp-json\/wp\/v2\/tags?post=8506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}