{"id":18238,"date":"2023-10-19T10:55:00","date_gmt":"2023-10-19T10:55:00","guid":{"rendered":"https:\/\/www.prepbytes.com\/blog\/?p=18238"},"modified":"2023-10-19T10:55:00","modified_gmt":"2023-10-19T10:55:00","slug":"iptables-command-in-linux-with-examples","status":"publish","type":"post","link":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/","title":{"rendered":"IPtables Command in Linux with Examples"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\" alt=\"\" \/><\/p>\n<p>In the world of Linux system administration and network security, the iptables command is a vital tool. iptables is a powerful firewall management tool that allows you to configure, secure, and monitor network traffic on your Linux system. With iptables, you can define rules to control incoming and outgoing traffic, perform network address translation (NAT), and even shape network traffic to prioritize certain services.<\/p>\n<p>In this article, we will explore the iptables command in Linux comprehensively. We will discuss its fundamentals, various options, and provide practical examples of how to use iptables to enhance the security and performance of your Linux server. Whether you&#8217;re a seasoned Linux administrator or just getting started, understanding iptables is crucial for managing your server&#8217;s network traffic effectively.<\/p>\n<h2>What is iptables command in linux with examples?<\/h2>\n<p>iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling. It is an essential tool for network administrators to control incoming and outgoing traffic, implement security policies, perform network address translation (NAT), and shape network traffic. Below are some examples of using iptables to perform common tasks:<\/p>\n<p><strong>1. List Current Rules:<\/strong><br \/>\nTo list the current rules in iptables, use the following command:<\/p>\n<pre><code>iptables -L<\/code><\/pre>\n<p>This command will display the rules for the default filter table.<\/p>\n<p><strong>2. Allow All Loopback Traffic:<\/strong><br \/>\nTo allow all loopback traffic, which is essential for local communication, run the following command:<\/p>\n<pre><code>iptables -A INPUT -i lo -j ACCEPT\niptables -A OUTPUT -o lo -j ACCEPT<\/code><\/pre>\n<p><strong>3. Block Incoming Traffic from a Specific IP Address:<\/strong><br \/>\nTo block incoming traffic from a specific IP address, use this command:<\/p>\n<pre><code>iptables -A INPUT -s 192.168.1.100 -j DROP<\/code><\/pre>\n<p>Replace 192.168.1.100 with the IP address you want to block.<\/p>\n<p><strong>4. Allow Incoming SSH (Port 22) Traffic:<\/strong><br \/>\nTo allow incoming SSH traffic, which runs on port 22, use this command:<\/p>\n<pre><code>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<\/code><\/pre>\n<p><strong>5. Enable Network Address Translation (NAT):<\/strong><br \/>\nTo enable NAT and allow your Linux machine to act as a gateway for other devices, use the following commands:<\/p>\n<pre><code>iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE\nReplace eth0 with the appropriate network interface.<\/code><\/pre>\n<p><strong>6. Port Forwarding:<\/strong><br \/>\nTo forward incoming traffic on a specific port to an internal IP address and port, use the following command:<\/p>\n<pre><code>iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 192.168.1.100:80<\/code><\/pre>\n<p>This example forwards incoming HTTP (port 80) traffic to an internal server at 192.168.1.100.<\/p>\n<p><strong>7. Save Rules:<\/strong><br \/>\nTo save your iptables rules so they persist after a system reboot, you can use iptables-persistent (for Debian-based systems) or save the rules manually using iptables-save. For example:<\/p>\n<pre><code>iptables-save &gt; \/etc\/iptables\/rules.v4<\/code><\/pre>\n<p><strong>8. Delete Rules:<\/strong><br \/>\nTo delete a specific rule, list the rules and identify the rule number you want to delete, and then use the -D option. For example:<\/p>\n<pre><code>iptables -L --line-numbers\niptables -D INPUT 2<\/code><\/pre>\n<p>This deletes the rule at position 2 in the INPUT chain.<\/p>\n<p>These are just a few examples of what you can do with iptables. It&#8217;s a versatile tool for configuring and securing your network traffic according to your specific needs. Make sure to exercise caution when implementing firewall rules to avoid accidentally locking yourself out of your server.<\/p>\n<p><strong>Conclusion:<\/strong><br \/>\nIn conclusion, the iptables command is a critical component of Linux system administration, providing robust network security and traffic control capabilities. With its vast array of options and features, iptables empowers administrators to safeguard their servers from unauthorized access and tailor network behavior to meet specific requirements.<\/p>\n<p>This article has covered the basics of iptables, such as rules, chains, and policies, and provided practical examples to help you get started with using iptables effectively. By mastering iptables, you can secure your server, manage network traffic, and optimize network services, ensuring your Linux system operates smoothly and securely.<\/p>\n<p>As you continue to explore the world of Linux system administration, iptables is a tool that will serve you well, allowing you to fine-tune network configurations and enhance the overall security of your Linux environment.<\/p>\n<h2>FAQ (Frequently Asked Questions) Related to iptables command in linux with examples:<\/h2>\n<p>Here are some FAQs related to iptables command in linux with examples.<\/p>\n<p><strong>1. Is it necessary to have root or sudo privileges to use iptables?<\/strong><br \/>\nYes, you typically need root or sudo privileges to configure and manage iptables rules because it involves altering network configurations, which requires elevated permissions.<\/p>\n<p><strong>2. How do I check if iptables is installed on my Linux system?<\/strong><br \/>\nYou can check if iptables is installed by running the command iptables &#8211;version or sudo iptables &#8211;version. If it&#8217;s not installed, you can typically install it using your distribution&#8217;s package manager.<\/p>\n<p><strong>3. What are some common use cases for iptables?<\/strong><br \/>\nCommon use cases for iptables include setting up a basic firewall, enabling network address translation (NAT), shaping network traffic, and managing ports and services.<\/p>\n<p><strong>4. Can iptables rules be saved and loaded automatically on system boot?<\/strong><br \/>\nYes, iptables rules can be saved and loaded automatically on system boot. Tools like iptables-persistent in Debian-based systems and firewalld in Red Hat-based systems simplify this process.<\/p>\n<p><strong>5. How can I allow or block specific IP addresses or ranges using iptables?<\/strong><br \/>\nYou can allow or block specific IP addresses or IP ranges using rules like iptables -A INPUT -s  -j ACCEPT or iptables -A INPUT -s  -j DROP.<\/p>\n<p><strong>6. Is it possible to log network packets using iptables?<\/strong><br \/>\nYes, iptables allows you to log network packets. You can use the -j LOG target in your rules to log packets to the system log.<\/p>\n<p><strong>7. What is the difference between iptables and ufw?<\/strong><br \/>\niptables is a low-level firewall management tool with more advanced features, while ufw (Uncomplicated Firewall) is a user-friendly interface for configuring iptables rules.<\/p>\n<p><strong>8. Can I use iptables to shape network traffic and prioritize services?<\/strong><br \/>\nYes, iptables can be used to shape network traffic and prioritize services using the tc (Traffic Control) module in conjunction with iptables rules.<\/p>\n<p><strong>9. How do I reset or flush iptables rules to their default state?<\/strong><br \/>\nYou can reset or flush iptables rules by running the command iptables -F or iptables &#8211;flush. This will remove all custom rules, allowing you to start fresh.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of Linux system administration and network security, the iptables command is a vital tool. iptables is a powerful firewall management tool that allows you to configure, secure, and monitor network traffic on your Linux system. With iptables, you can define rules to control incoming and outgoing traffic, perform network address translation (NAT), [&hellip;]<\/p>\n","protected":false},"author":52,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-18238","post","type-post","status-publish","format-standard","hentry","category-operating-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IPtables Command in Linux with Examples<\/title>\n<meta name=\"description\" content=\"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPtables Command in Linux with Examples\" \/>\n<meta property=\"og:description\" content=\"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"PrepBytes Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/prepbytes0211\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T10:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\" \/>\n<meta name=\"author\" content=\"Prepbytes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prepbytes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\"},\"author\":{\"name\":\"Prepbytes\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\"},\"headline\":\"IPtables Command in Linux with Examples\",\"datePublished\":\"2023-10-19T10:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\"},\"wordCount\":950,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"image\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\",\"articleSection\":[\"Operating system\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\",\"url\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\",\"name\":\"IPtables Command in Linux with Examples\",\"isPartOf\":{\"@id\":\"http:\/\/43.205.93.38\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\",\"datePublished\":\"2023-10-19T10:55:00+00:00\",\"description\":\"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.\",\"breadcrumb\":{\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage\",\"url\":\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\",\"contentUrl\":\"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/43.205.93.38\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operating system\",\"item\":\"https:\/\/prepbytes.com\/blog\/category\/operating-system\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPtables Command in Linux with Examples\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/43.205.93.38\/#website\",\"url\":\"http:\/\/43.205.93.38\/\",\"name\":\"PrepBytes Blog\",\"description\":\"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING\",\"publisher\":{\"@id\":\"http:\/\/43.205.93.38\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/43.205.93.38\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/43.205.93.38\/#organization\",\"name\":\"Prepbytes\",\"url\":\"http:\/\/43.205.93.38\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"contentUrl\":\"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp\",\"width\":160,\"height\":160,\"caption\":\"Prepbytes\"},\"image\":{\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/prepbytes0211\/\",\"https:\/\/www.instagram.com\/prepbytes\/\",\"https:\/\/www.linkedin.com\/company\/prepbytes\/\",\"https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e\",\"name\":\"Prepbytes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/43.205.93.38\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g\",\"caption\":\"Prepbytes\"},\"url\":\"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPtables Command in Linux with Examples","description":"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/","og_locale":"en_US","og_type":"article","og_title":"IPtables Command in Linux with Examples","og_description":"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.","og_url":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/","og_site_name":"PrepBytes Blog","article_publisher":"https:\/\/www.facebook.com\/prepbytes0211\/","article_published_time":"2023-10-19T10:55:00+00:00","og_image":[{"url":"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg","type":"","width":"","height":""}],"author":"Prepbytes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prepbytes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#article","isPartOf":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/"},"author":{"name":"Prepbytes","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e"},"headline":"IPtables Command in Linux with Examples","datePublished":"2023-10-19T10:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/"},"wordCount":950,"commentCount":0,"publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"image":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg","articleSection":["Operating system"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/","url":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/","name":"IPtables Command in Linux with Examples","isPartOf":{"@id":"http:\/\/43.205.93.38\/#website"},"primaryImageOfPage":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage"},"image":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg","datePublished":"2023-10-19T10:55:00+00:00","description":"iptables is a powerful command-line utility in Linux used to configure, manage, and secure network traffic by setting up rules for packet filtering and firewalling.","breadcrumb":{"@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#primaryimage","url":"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg","contentUrl":"https:\/\/prepbytes-misc-images.s3.ap-south-1.amazonaws.com\/assets\/1697712851388-Topic%20%2824%29.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/prepbytes.com\/blog\/iptables-command-in-linux-with-examples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/43.205.93.38\/"},{"@type":"ListItem","position":2,"name":"Operating system","item":"https:\/\/prepbytes.com\/blog\/category\/operating-system\/"},{"@type":"ListItem","position":3,"name":"IPtables Command in Linux with Examples"}]},{"@type":"WebSite","@id":"http:\/\/43.205.93.38\/#website","url":"http:\/\/43.205.93.38\/","name":"PrepBytes Blog","description":"ONE-STOP RESOURCE FOR EVERYTHING RELATED TO CODING","publisher":{"@id":"http:\/\/43.205.93.38\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/43.205.93.38\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/43.205.93.38\/#organization","name":"Prepbytes","url":"http:\/\/43.205.93.38\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/","url":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","contentUrl":"https:\/\/blog.prepbytes.com\/wp-content\/uploads\/2025\/07\/uzxxllgloialmn9mhwfe.webp","width":160,"height":160,"caption":"Prepbytes"},"image":{"@id":"http:\/\/43.205.93.38\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/prepbytes0211\/","https:\/\/www.instagram.com\/prepbytes\/","https:\/\/www.linkedin.com\/company\/prepbytes\/","https:\/\/www.youtube.com\/channel\/UC0xGnHDrjUM1pDEK2Ka5imA"]},{"@type":"Person","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/3f7dc4ae851791d5947a7f99df363d5e","name":"Prepbytes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/43.205.93.38\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/232042cd1a1ea0e982c96d2a2ec93fb70a8e864e00784491231e7bfe5a9e06b5?s=96&d=mm&r=g","caption":"Prepbytes"},"url":"https:\/\/prepbytes.com\/blog\/author\/gourav-jaincollegedekho-com\/"}]}},"_links":{"self":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/comments?post=18238"}],"version-history":[{"count":1,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18238\/revisions"}],"predecessor-version":[{"id":18239,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/posts\/18238\/revisions\/18239"}],"wp:attachment":[{"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/media?parent=18238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/categories?post=18238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prepbytes.com\/blog\/wp-json\/wp\/v2\/tags?post=18238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}