{"id":27092,"date":"2026-01-09T10:00:00","date_gmt":"2026-01-09T09:00:00","guid":{"rendered":"https:\/\/contabo.com\/blog\/?p=27092"},"modified":"2026-02-06T10:30:57","modified_gmt":"2026-02-06T09:30:57","slug":"linux-telnet-command","status":"publish","type":"post","link":"https:\/\/contabo.com\/blog\/linux-telnet-command\/","title":{"rendered":"Linux Telnet Command: Tips &#038; Tricks\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp\" alt=\"\" class=\"wp-image-27138\" srcset=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp 1200w, https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command-600x315.webp 600w, https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command-768x403.webp 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p>The telnet command in Linux is a veteran utility for communicating with remote hosts via the TELNET protocol. It sits at the application layer of the TCP\/IP stack, letting you open a bidirectional, interactive text terminal over a virtual connection. While it was first built for remote logins, its job has shifted quite a bit over the last few decades.&nbsp;<\/p>\n\n\n\n<p>When you run it, you&#8217;re essentially starting a TCP connection to a specific port on another machine. Once you&#8217;re in, Telnet sends every character you type straight to the server and shows you whatever the server sends back. This transparency is exactly why it\u2019s still a favorite for system admins; it lets you talk directly to network services without the extra layers or fluff of modern interfaces.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-vulnerabilities-and-why-we-use-the-telnet-command-in-linux\">Security Vulnerabilities and Why We Use the Telnet Command in Linux<\/h3>\n\n\n\n<p>Even though it\u2019s handy, we have to face facts: Telnet is a legacy tool. It sends everything\u2014even your usernames and passwords\u2014in plain text. This lack of encryption makes it a sitting duck for packet sniffing and man-in-the-middle attacks. Because of these risks, most people have switched to SSH (Secure Shell) for managing servers.&nbsp;<\/p>\n\n\n\n<p>However, the telnet linux utility is still a powerhouse for troubleshooting. Since it\u2019s simple and doesn&#8217;t bother with complex handshakes, it&#8217;s the perfect way to test if a specific port is open. Whether you&#8217;re checking if a web server is up on port 80 or seeing if a firewall is blocking an app, it gives you instant, clear results.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-telnet-for-network-troubleshooting-when-to-use-nbsp\">Telnet For Network Troubleshooting &#8211; When To Use&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-verifying-linux-telnet-reachability-and-firewall-connectivity-nbsp\">Verifying Linux Telnet Reachability and Firewall Connectivity&nbsp;<\/h3>\n\n\n\n<p>Telnet might not be the standard for managing servers anymore, but it&#8217;s still great for finding network bottlenecks and misconfigured services. Most of the time, you&#8217;ll use it just to see if a service is reachable. If an app can&#8217;t talk to a database or a web server, a quick Telnet connection lets you skip the messy app logs and see if the network path is actually open.&nbsp;<\/p>\n\n\n\n<p>Knowing the right linux telnet command syntax is a lifesaver when testing firewall rules. If an iptables rule or a security group is blocking you, the connection will usually just time out or get refused immediately. This helps you figure out if the network is the problem or if the application itself has crashed. If you can connect via Telnet but the app still fails, you know the issue is likely in the app&#8217;s config rather than the infrastructure.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-testing-protocol-handshakes-and-telnet-command-linux-limitations-nbsp\">Testing Protocol Handshakes and Telnet Command Linux Limitations&nbsp;<\/h3>\n\n\n\n<p>You can also use it to test protocol handshakes. Because Telnet gives you a raw stream, you can manually type out commands for protocols like SMTP or HTTP. This lets you see the exact error codes the server sends back, which modern browsers and mail clients often hide.&nbsp;<\/p>\n\n\n\n<p>Just remember: don&#8217;t use it for anything sensitive or over the public internet. If a service needs encryption (like HTTPS or SMTPS), a standard telnet on linux connection won&#8217;t be able to handle the SSL\/TLS handshake. You\u2019ll just end up seeing garbled text or getting disconnected immediately.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-prerequisites-getting-a-telnet-connection-ready-nbsp\">Prerequisites: Getting a Telnet Connection Ready&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-performing-a-linux-install-telnet-via-package-managers-nbsp\">Performing a Linux Install Telnet via Package Managers&nbsp;<\/h3>\n\n\n\n<p>You\u2019ll need to make sure the client is actually on your machine before you start diagnosing things. Most modern distros don\u2019t include it by default because they want you to use more secure options. Thankfully, it&#8217;s still in the official repos for Ubuntu, Debian, CentOS, and RHEL.&nbsp;<\/p>\n\n\n\n<p>To install telnet debian or Ubuntu, you&#8217;ll use the apt package manager. Just run this in your terminal:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update &amp;&amp; sudo apt install telnet -y&nbsp;<\/code><\/pre>\n\n\n\n<p>If you&#8217;re on RHEL, Fedora, or CentOS, you&#8217;ll need dnf or yum. To do a yum install telnet, run:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo yum install telnet&nbsp;<\/code><\/pre>\n\n\n\n<p>For newer Fedora or RHEL versions, you can use:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install telnet&nbsp;<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-server-configuration-and-telnet-usage-verification-nbsp\">Server Configuration and Telnet Usage Verification&nbsp;<\/h3>\n\n\n\n<p>In some lab setups or old internal networks, you might need to host a Telnet server for incoming connections. This isn&#8217;t a great idea for public-facing machines, but if you have to do it on Ubuntu, grab the telnetd package. You&#8217;ll also need to open port 23 in your firewall. For example, with UFW: sudo ufw allow 23\/tcp.&nbsp;<\/p>\n\n\n\n<p>Before you install telnet ubuntu or any other distro in a corporate setting, make sure it\u2019s okay with your security policies. Once it\u2019s installed, just type &#8216;telnet&#8217; in your terminal; if the prompt changes to telnet&gt;, you\u2019re good to go.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-basic-telnet-commands-and-syntax-nbsp\">Basic Telnet Commands and Syntax&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mastering-the-telnet-connect-structure-and-port-selection-nbsp\">Mastering the Telnet Connect Structure and Port Selection&nbsp;<\/h3>\n\n\n\n<p>The syntax is simple, which makes it one of the easiest command-line tools to learn. To start a session, just type the command and then the destination. Using an IP address is usually better than a domain name if you&#8217;re trying to rule out DNS issues.&nbsp;<\/p>\n\n\n\n<p>The basic how to use telnet in linux structure looks like this:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>telnet &#91;hostname or IP address] &#91;port]&nbsp;<\/code><\/pre>\n\n\n\n<p>The port is optional, but if you leave it out, it defaults to port 23. Since port 23 is rarely used now, you\u2019ll almost always specify the port you need. For a web server, you\u2019d type: telnet 192.168.1.1 80.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-managing-a-telnet-session-and-escape-characters-nbsp\">Managing a Telnet Session and Escape Characters&nbsp;<\/h3>\n\n\n\n<p>Once you\u2019re connected, you\u2019re in interactive mode. If it works, you\u2019ll see a message about the escape character\u2014usually CTRL+]. This shortcut is vital; if the session hangs or the service won&#8217;t close, hitting CTRL and ] together brings you back to the internal telnet&gt; prompt.&nbsp;<\/p>\n\n\n\n<p>From there, you can run internal commands. Typing status shows your connection info, while display shows your parameters. To kill the connection and get back to your regular shell, type quit or exit.&nbsp;<\/p>\n\n\n\n<p>You can also use flags like -l to specify a user for logins, or -4 and -6 to force IPv4 or IPv6. Learning how to run telnet this way ensures you don&#8217;t get stuck in an unresponsive terminal.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-telnet-port-number-and-connectivity-testing-nbsp\">Telnet Port Number and Connectivity Testing&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-probing-remote-services-with-the-telnet-port-command-nbsp\">Probing Remote Services with the Telnet Port Command&nbsp;<\/h3>\n\n\n\n<p>Testing a specific telnet port number is one of the most common tasks for this tool. While port 23 is the protocol&#8217;s home, you can probe almost any listening service. Just put the port at the end of your command to see if the service is active, blocked, or offline.&nbsp;<\/p>\n\n\n\n<p>The output gives you instant clarity. If you see &#8220;Connected to&#8230;&#8221;, the network path is open and the service is listening. This rules out network-level trouble so you can focus on the application settings instead.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-troubleshooting-timeouts-and-telnet-commands-linux-nbsp\">Troubleshooting Timeouts and Telnet Commands Linux&nbsp;<\/h3>\n\n\n\n<p>If you get &#8220;Connection refused,&#8221; it usually means the machine is there, but nothing is listening on that port. If the command just sits there on &#8220;Trying [IP address]&#8230;&#8221;, that\u2019s a timeout. Usually, this means a firewall is silently dropping your packets.&nbsp;<\/p>\n\n\n\n<p>Knowing how to read these responses is a core part of system administration. Unlike a simple ping which only checks if a host is online (ICMP), a telnet linux command confirms that a specific application gateway (TCP) is actually ready to talk.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-telnet-example-scenarios-for-real-world-troubleshooting-nbsp\">Telnet Example Scenarios for Real-world Troubleshooting&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-manual-interaction-with-smtp-and-web-services-nbsp\">Manual Interaction with SMTP and Web Services&nbsp;<\/h3>\n\n\n\n<p>This is where the tool really shines. Since it handles the raw TCP connection, you can basically &#8220;pretend&#8221; to be a client. For a telnet command example, let&#8217;s look at a mail server on port 25:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>telnet mail.example.com 25&nbsp;<\/code><\/pre>\n\n\n\n<p>If it connects, you&#8217;ll see a banner from the server. Type HELO to start the handshake; the response will tell you if the server is accepting mail or if you&#8217;ve been blacklisted. It&#8217;s much faster than digging through logs.&nbsp;<\/p>\n\n\n\n<p>You can also check a web server on port 80. Send a manual request like:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>telnet <a href=\"https:\/\/www.google.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">www.google.com<\/a> 80&nbsp;\nGET \/ HTTP\/1.1&nbsp;\nHost: www.google.com<\/code><\/pre>\n\n\n\n<p>Hit Enter twice, and you&#8217;ll see the raw HTML headers and content. This proves the server is working regardless of how a browser renders it.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-verifying-mail-protocols-and-how-to-telnet-in-linux-nbsp\">Verifying Mail Protocols and How to Telnet in Linux&nbsp;<\/h3>\n\n\n\n<p>You can use these same steps for other services\u2014like testing POP3 on port 110 or IMAP on port 143 to check authentication. For custom TCP apps, knowing how to run telnet command tests against their specific ports is the best first step in any network investigation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-telnet-usage-sessions-and-security-limitations-nbsp\">Telnet Usage, Sessions and Security Limitations&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-session-management-and-connection-behavior-nbsp\">Session Management and Connection Behavior&nbsp;<\/h3>\n\n\n\n<p>Managing a session is a bit different than modern encrypted ones. The connection stays open as long as the socket is active. But because there\u2019s no built-in &#8220;heartbeat,&#8221; sessions often hang. If the network drops, your terminal might lock up, forcing you to use that escape character to get control back.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-understanding-the-risks-of-telnet-from-linux-nbsp\">Understanding the Risks of Telnet From Linux&nbsp;<\/h3>\n\n\n\n<p>The biggest catch with Telnet is the lack of security. Every packet is sent in cleartext. If you use it to log in, anyone with a packet sniffer can see your credentials. Because of this, using it for remote admin\u2014especially over the internet\u2014is a huge risk and often breaks compliance rules like PCI-DSS or HIPAA.&nbsp;<\/p>\n\n\n\n<p>Beyond theft, sessions are open to hijacking. Since there\u2019s no certificate verification, a hacker could intercept your traffic or spoof the host. That\u2019s why the world moved to SSH. It\u2019s a great tool for port checking, but never use it for private data or production infrastructure where security matters.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-alternatives-to-telnet-for-troubleshooting-nbsp\">Secure Alternatives to Telnet for Troubleshooting&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-modern-remote-access-and-network-diagnostics-nbsp\">Modern Remote Access and Network Diagnostics&nbsp;<\/h3>\n\n\n\n<p>For general remote access, SSH is the king. It gives you a secure, encrypted tunnel for both commands and files. Most servers now have Telnet disabled anyway, making SSH the only real option.&nbsp;<\/p>\n\n\n\n<p>For diagnostics, Netcat (or nc) is widely seen as the better successor. It\u2019s more flexible, testing both TCP and UDP, and it handles timeouts much better. It&#8217;s also way easier to use in automated scripts.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-web-specific-services-and-discovery-nbsp\">Web-Specific Services and Discovery&nbsp;<\/h3>\n\n\n\n<p>When you&#8217;re dealing with the web, curl and wget are much better than manual Telnet. They handle SSL\/TLS handshakes natively, so they can test HTTPS on port 443. They also give you better info on headers and cookies.&nbsp;<\/p>\n\n\n\n<p>For wider discovery, use nmap. While Telnet checks one port at a time, nmap can scan thousands of ports across many hosts at once. If you need to test mail specifically, swaks is much more powerful for automated testing than typing manual SMTP commands into a prompt.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-linux-telnet-command-faq\">Linux Telnet Command FAQ<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-do-i-use-the-telnet-command-in-linux-nbsp\">How do I use the telnet command in Linux?&nbsp;<\/h3>\n\n\n\n<p>Open your terminal and type telnet followed by the IP or hostname and the port. Example: telnet 192.168.1.10 80.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-the-telnet-command-in-linux-nbsp\">What is the telnet command in Linux?&nbsp;<\/h3>\n\n\n\n<p>It\u2019s a networking tool used to open a TCP connection to a remote host, mostly used today to check if ports are open.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-does-the-telnet-command-do-in-linux-nbsp\">What does the telnet command do in Linux?&nbsp;<\/h3>\n\n\n\n<p>It starts a raw, unencrypted communication channel, sending what you type to the server and printing the response back to you.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-do-i-start-the-telnet-server-command-in-linux-nbsp\">How do I start the telnet server command in Linux?&nbsp;<\/h3>\n\n\n\n<p>Install telnetd, then use systemctl to start inetd or telnet.socket, depending on your distro.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-do-i-install-the-telnet-command-in-linux-nbsp\">How do I install the telnet command in Linux?&nbsp;<\/h3>\n\n\n\n<p>Use sudo apt install telnet on Ubuntu\/Debian or sudo dnf install telnet on RHEL\/Fedora.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-do-i-exit-from-the-telnet-command-in-linux-nbsp\">How do I exit from the telnet command in Linux?&nbsp;<\/h3>\n\n\n\n<p>Press CTRL and ] to get to the telnet&gt; prompt, then type quit.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>Mastering Telnet is still a must for any system admin or network engineer. It\u2019s no longer the main way to access servers, but its simplicity as a diagnostic tool is hard to beat. It gives you a clear window into TCP connections, letting you see exactly how a server responds at the protocol level.&nbsp;<\/p>\n\n\n\n<p>Whether you&#8217;re checking firewalls or testing mail servers, knowing how to use this tool will save you a ton of time. As long as you keep the security risks in mind and use it mostly for testing, Telnet remains a reliable bridge between your terminal and the network.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Master the Linux telnet command for network troubleshooting. Learn how to install Telnet, test open ports, verify firewalls, and much more!<\/p>\n","protected":false},"author":50,"featured_media":27138,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[18],"tags":[],"ppma_author":[1491],"class_list":["post-27092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"uagb_featured_image_src":{"full":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp",1200,630,false],"thumbnail":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command-150x150.webp",150,150,true],"medium":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command-600x315.webp",600,315,true],"medium_large":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command-768x403.webp",768,403,true],"large":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp",1200,630,false],"1536x1536":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp",1200,630,false],"2048x2048":["https:\/\/contabo.com\/blog\/wp-content\/uploads\/2026\/01\/blog-head-linux-telnet-command.webp",1200,630,false]},"uagb_author_info":{"display_name":"Tobias Mildenberger","author_link":"https:\/\/contabo.com\/blog\/author\/tobias\/"},"uagb_comment_info":0,"uagb_excerpt":"Master the Linux telnet command for network troubleshooting. Learn how to install Telnet, test open ports, verify firewalls, and much more!","authors":[{"term_id":1491,"user_id":50,"is_guest":0,"slug":"tobias","display_name":"Tobias Mildenberger","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/077178d5dce6c3d4c0c0396857a7e544bfdf8adf04145fff5160b33a22e28b1f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/27092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/comments?post=27092"}],"version-history":[{"count":8,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/27092\/revisions"}],"predecessor-version":[{"id":27929,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/posts\/27092\/revisions\/27929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/media\/27138"}],"wp:attachment":[{"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/media?parent=27092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/categories?post=27092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/tags?post=27092"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/contabo.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=27092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}