{"id":233,"date":"2021-07-09T11:43:55","date_gmt":"2021-07-09T06:13:55","guid":{"rendered":"https:\/\/www.tescaglobal.com\/blog\/?p=233"},"modified":"2021-09-27T12:37:28","modified_gmt":"2021-09-27T07:07:28","slug":"what-is-an-internet-protocol-address","status":"publish","type":"post","link":"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/","title":{"rendered":"What is an Internet Protocol Address \u2013 Definition and Explanation"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a027bbfebf35\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a027bbfebf35\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#What_is_an_IP\" title=\"What is an IP?\">What is an IP?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#How_do_IP_addresses_work\" title=\"How do IP addresses work?\">How do IP addresses work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#Types_of_IP_addresses\" title=\"Types of IP addresses\">Types of IP addresses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#Types_of_website_IP_addresses\" title=\"Types of website IP addresses\">Types of website IP addresses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#How_to_lookup_IP_addresses\" title=\"How to lookup IP addresses?\">How to lookup IP addresses?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#IP_address_security_threats\" title=\"IP address security threats\">IP address security threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#How_to_protect_and_hide_your_IP_address\" title=\"How to protect and hide your IP address?\">How to protect and hide your IP address?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-protocol-address\/#When_should_you_use_VPN\" title=\"When should you use VPN?\">When should you use VPN?<\/a><\/li><\/ul><\/nav><\/div>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">An IP address or<strong> Internet Protocol <\/strong>address refers to the numerical label that is assigned to each device that is connected to a computer network. This network uses Internet protocol for the purpose of communication. It serves two functions comprising location addressing and network interface identification.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">An Internet Protocol address is considered as a unique identifier that is being assigned to a domain of the device that is connected to the Internet. It is a series of characters that translates the human-readable domain names into IP addresses. This assists the users in accessing the websites without the need of memorizing complex series of various characters used in the address.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">IP version 4 is known to define an IP address as a 32-bit number. With the increase in the growth of the Internet and reduction of the IPv4 addresses present, a new version of IPv6 was standardized in the year 1998 by using the 128 bits.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"What_is_an_IP\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\">What is an IP?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">IP stands for Internet Protocol, it is a set of rules or protocols that is used for the purpose of addressing packets of data and routing. This leads to their traveling across networks and arrival at the desired destination.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Data that is traversing the Internet is divided into little pieces termed packets. Here, IP information is being attached to each of the packets. This information further aids the routers in sending packets to the right destination.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Every domain and device that is connected to the Internet is provided with an IP address. These are further directed to the IP address that is attached to these as packets, the data reaches where it is supposed to reach.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">There is a transport protocol that is being used in combination with the IP address. As soon as the packets reach their destination, they are being treated in a different manner as per their transport protocol. UDP and TCP are the most commonly used transport protocols. Now let\u2019s read about <strong>how addresses work<\/strong>.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"How_do_IP_addresses_work\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\">How do IP addresses work?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Each <strong>Internet Protocol<\/strong> address comprises the IP address of the recipient and the IP address of the device. It is the same as it is in the case of an email where both the return address and location address are included.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Every time a person intends to send an email, he needs to access a network that is connected to the internet or one which leads to it. This happens by either connecting to a computer network available at the office or by using internet service provider (ISP).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">To ensure that the work is done successfully, the computer makes use of the Internet Protocol. Here, the <strong>Internet Protocol<\/strong> address is being used as a virtual return address for establishing a connection. Computers are known for working with the binary format and accepting it makes it easier to understand the working of an IP address.<\/span><\/p>\n<p><span style=\"color: #ff0000;\">You can read also:<\/span> <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-an-internet-service-provider\/\"><strong>What is an\u00a0Internet Service Provider?<\/strong><strong>\u00a0<\/strong><\/a><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">The address is made up of hexadecimal digits that are referred to as octets. These are known for creating an addressing scheme that further accommodates various types of networks. An IP address is generally divided into two parts which are a host address and a network address.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">The left part of the IP address is the network address or ID that helps us in identifying the specific network and location of the device. The part that is left in IP address after the network ID is the host address or ID. It is used for the purpose of identifying the specific device present on the network.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">This division is responsible for bringing everything together; the first few octets present in the IP address are used for identifying the network. The number of octets that are required depends on the class of network.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Generally, in addition to the <strong>Internet Protocol<\/strong> address, there is an associated subnet mask and a default gateway address that is being listed with the IP addressing information. This default address is usually named according to the platform being used.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">It may be termed as a default route, router address, gateway, or router. The default IP address is being used for sending the network data by a device. Every time data is required to be sent to a different network other than the device being used on, this address is being put to use.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">In the presence of a home network that has an availability of multiple devices, it is likely to have a router that is joined to the internet via modem. Here, the router may either be a part of the router combo unit\/modem or a separate device that is being supplied by the internet services provider.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">A router is known to be present between the devices, the computers on the network being used, and the public-facing devices that are present on the internet that routes the traffic. There is a final information piece that is being assigned with the IP address, default gateway, and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Subnetwork\" target=\"_blank\" rel=\"noopener\">subnet mask<\/a>.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">This final piece is the addresses of one or two default domain name system servers, commonly known as the DNS servers. These DNS servers work like a phone book that looks up for human-readable things such as looking for and converting the website names into IP addresses.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">This is done by DNS by storing all the information on the system of the DNS servers that are linked across the internet. If there are queries that are required to be sent, then the devices need to know the address of the DNS servers.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Generally, the default gateway address and the DNS server IP address are the same on a small home network. The queries are being sent to the router by the devices which are forwarded to the respective DNS servers that the router is configured for use. After reading about <strong>how addresses work<\/strong>, let\u2019s read about the types of <strong>Internet Protocol<\/strong> addresses.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Types_of_IP_addresses\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\"><strong>Types of IP addresses<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Now let\u2019s read about the <strong>types of IP addresses<\/strong>; there are mainly four types of IP addresses. These four types are public, private, static, and dynamic. The first two types which are public and private are based on the location of their network. A private network is the one that should be used within a network while public IP may be used outside the network.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Public IP Address:<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">This type of IP address is an address in which a single primary address is associated with the complete network. In this type of address, every single connected device is provided the same IP address. This address is given by the internet service provider to the router.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Private IP Address:<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">A private IP address comprises a unique number that is provided to every device connected to the internet network at home. Here, devices include smartphones, tablets, and computers that are being used at home.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Apart from the above, it may also include Bluetooth devices such as smart devices, television, printers, and many more. There has been a constant rise in IoT products which has further led to an increase in the requirement of private IP addresses.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Dynamic IP Address:<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">A dynamic IP address is an address in which the address keeps on changing. This type of IP address is temporary and is mainly allocated to devices each time they are connected to the web.<\/span><\/p>\n<p><span style=\"color: #ff0000;\">You can read also:<\/span>\u00a0<span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-local-area-network-types-and-benefits-of-lan\/\"><strong>What is Local Area Network, Types, and Benefits of LAN?<\/strong><\/a><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">They are capable of tracing the origin of the collection of <strong>Internet Protocol<\/strong> addresses being shared across various computers. This type of IP address is yet another type that plays an important role by being active for a required time period after which it expires.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Static IP Address:<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">A static IP address is a type of IP address that is not dynamic; this type remains the same and doesn\u2019t change. However, it may be altered for the purpose of and as a part of routine network administration. This type is mainly consistent; once assigned, it is liable to remain the same over the years. It assists in procuring information about a particular device.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Types_of_website_IP_addresses\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\"><strong>Types of website IP addresses<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Now let\u2019s read about the <strong>types of website IP addresses<\/strong>. There are mainly two types of website IP addresses which are Shared IP addresses and dedicated IP addresses. A shared IP address is the type of address that is mainly used by small business websites.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">These small businesses are the ones that have a small number of visitors and do not have many files or pages on their websites. This type of address is not unique and may be shared with other websites as well.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">On the other hand, a dedicated IP address is one that is unique to each site and assists in avoiding various potential backlists. These backlists may be present as a list of bad behavior done by the others on the same server, you are working on.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">This type of address further gives the option of pulling up the site by making use of the <strong>Internet Protocol<\/strong> address alone instead of the domain name. It is also helpful in accessing the website while you are waiting for the domain transfer.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"How_to_lookup_IP_addresses\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\">How to lookup <strong>IP addresses<\/strong>?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">No matter which device or software you are using, there is a requirement to navigate the ethernet or WiFi settings if you wish to find an IP address. There is a different procedure for working on it on various devices.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">If you are working on Mac, then visit the Apple menu, go to system preferences, select network, select either Ethernet or WiFi, and depending on the type of connection you are using, the IP address will be displayed in an open window below the connection status.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">In case you are working on a PC that is running on Windows 10; follow these steps. Select WiFi on the taskbar or ethernet, then click on the network that you are using, go to properties and you will be able to see your IP address near IPv4 address.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">When it comes to an android smartphone or a tablet, visit settings, select wireless, and networks, or opt for network and internet on the pixel device, go to the WiFi network that you are working on, the address will be visible alongside the information of the network.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">When it comes to an iPad and iPhone settings, visit WiFi, tap the arrow that is present next to the network name, you will be able to see the IP address displayed on the right side of the <strong>IP address<\/strong>.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"IP_address_security_threats\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\"><strong>IP address security<\/strong> threats<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Security threats are common, cybercriminals may use various methods to get your IP address. The most common ways of being online stalking and social engineering. Social engineering is used to fool the user and obtain IP addresses from them. Therefore, it is important that you keep a track of who you are coming in contact with online.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Cybercriminals can easily obtain the user\u2019s IP address by stalking their online activities. There are numerous activities that can reveal your IP address when performed online by the user such as commenting on various websites and forums or simply by playing video games.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Once the IP address is obtained by the hackers, they may use it for the purpose of downloading illegal stuff online. Your IP address may be used for downloading or pirating content including music, movies or videos, or something much more serious.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">The IP address allows the users to track down your location; this means that through your IP address the criminals can reach where you are staying. They may be thieves and may rob your belonging when you are away or cause harm. Further, hackers may even attack your network directly or hack your device.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"How_to_protect_and_hide_your_IP_address\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\">How to protect and hide your IP address?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">The best way to protect your <strong>IP address<\/strong> is to hide it; this will help you in safeguarding your private information and online identity. The two basic ways of hiding the <strong>Internet Protocol<\/strong> address include using a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" target=\"_blank\" rel=\"noopener\">virtual private network<\/a> (VPN) and by using a proxy server.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">An intermediary server through which the traffic is routed may be termed as a proxy server. By using this server, only the IP address of the proxy server will be visible to the hackers and not your IP address. If any information is sent by them, it reaches you through the proxy.<\/span><\/p>\n<p><span style=\"color: #ff0000;\">You can read also:<\/span>\u00a0<span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.tescaglobal.com\/blog\/what-is-a-microcontrollers-and-how-does-it-work\/\"><strong>What is a Microcontroller, and How does it Work?<\/strong><\/a><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Compared to a proxy server, VPN is known for offering a better solution to the users. In this, the network shown is that of the VPN that you are using by connecting your devices such as a smartphone or a computer.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Here, all the network traffic is being sent to the VPN via a secure connection. Using a VPN allows the usage of local network resources securely even when the user is in a different country. <strong>IP address security<\/strong> is important for safeguarding user\u2019s private information.<\/span><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"When_should_you_use_VPN\"><\/span><span style=\"font-family: helvetica, arial, sans-serif; color: #ff0000;\">When should you use VPN?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Using a VPN or a virtual private network makes it easier for the user to protect the IP address. You may use a VPN while using a public WiFi network even though it might be password protected as it is easier for the hacker to hack your data on WiFi.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">The other times when you may use VPN are when you are traveling, working remotely, or need privacy. Every time you are access data on a site, your IP address gets logged which allows others to learn about you. They get every detail for the time you have used that website. VPN protects the user from this by hiding their <strong>IP address<\/strong>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An IP address or Internet Protocol address refers to the numerical label that is assigned to each device that is connected to a computer network. This network uses Internet protocol for the purpose of communication. It serves two functions comprising location addressing and network interface identification. An Internet Protocol address is considered as a unique [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":234,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[236,232],"tags":[],"_links":{"self":[{"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/posts\/233"}],"collection":[{"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":0,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/posts\/233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/media\/234"}],"wp:attachment":[{"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/media?parent=233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/categories?post=233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tescaglobal.com\/blog\/wp-json\/wp\/v2\/tags?post=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}