{"id":11398,"date":"2025-05-08T06:38:35","date_gmt":"2025-05-08T06:38:35","guid":{"rendered":"https:\/\/mainvps.net\/blog\/?p=11398"},"modified":"2025-05-29T10:03:03","modified_gmt":"2025-05-29T10:03:03","slug":"rdp-port-3389-security-guide","status":"publish","type":"post","link":"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/","title":{"rendered":"Remote Desktop Protocol Port 3389: What It Is, Why It Matters, and How to Secure It"},"content":{"rendered":"\n<p>If you\u2019re managing a Windows server or accessing a desktop remotely, chances are you\u2019re using RDP and that means port 3389 is in play. But what does that really mean, and how do you make sure it\u2019s safe? Let\u2019s break it down in real terms.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#What_Is_Port_3389_and_Why_Should_You_Care\" >What Is Port 3389 and Why Should You Care?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#What_Is_RDP_Used_For\" >What Is RDP Used For?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Why_Port_3389_Is_a_Security_Risk_If_Left_Unchecked\" >Why Port 3389 Is a Security Risk (If Left Unchecked)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#1_Its_Widely_Scanned_by_Bots\" >1. It\u2019s Widely Scanned by Bots<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#2_Its_Been_Exploited_Before\" >2. It\u2019s Been Exploited Before<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#3_Its_a_Launchpad_for_Ransomware\" >3. It\u2019s a Launchpad for Ransomware<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#How_to_Secure_Port_3389_Without_Disabling_RDP_Completely\" >How to Secure Port 3389 (Without Disabling RDP Completely)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_1_Use_a_VPN_to_Hide_Port_3389\" >\u2705 1. Use a VPN to Hide Port 3389<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_2_Restrict_Access_by_IP_Address\" >\u2705 2. Restrict Access by IP Address<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_3_Change_the_Default_RDP_Port\" >\u2705 3. Change the Default RDP Port<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_4_Enable_Network_Level_Authentication_NLA\" >\u2705 4. Enable Network Level Authentication (NLA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_5_Use_Strong_Passwords_Multi-Factor_Authentication_MFA\" >\u2705 5. Use Strong Passwords + Multi-Factor Authentication (MFA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#%E2%9C%85_6_Patch_Early_Patch_Often\" >\u2705 6. Patch Early, Patch Often<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Bonus_Tip_Use_Log_Monitoring_Alerts\" >Bonus Tip: Use Log Monitoring &amp; Alerts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Common_Questions_FAQs\" >Common Questions (FAQs)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Q1_Can_I_completely_disable_port_3389\" >Q1: Can I completely disable port 3389?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Q2_Whats_the_safest_way_to_access_RDP_from_outside_the_network\" >Q2: What\u2019s the safest way to access RDP from outside the network?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Q3_Is_changing_the_RDP_port_enough_for_security\" >Q3: Is changing the RDP port enough for security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Q4_How_do_I_know_if_someones_trying_to_attack_RDP\" >Q4: How do I know if someone\u2019s trying to attack RDP?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Q5_Are_there_better_alternatives_to_RDP\" >Q5: Are there better alternatives to RDP?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/#Final_Thoughts_RDP_Is_a_Tool%E2%80%94Use_It_Wisely\" >Final Thoughts: RDP Is a Tool\u2014Use It Wisely<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_Port_3389_and_Why_Should_You_Care\"><\/span>What Is Port 3389 and Why Should You Care?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Port 3389<\/strong> is the default port used by <strong>Remote Desktop Protocol (RDP)<\/strong>, the built-in Windows feature that lets you access and control your computer or server remotely.<\/p>\n\n\n\n<p>Imagine sitting at your home office and needing to jump into your work computer across town. <a href=\"https:\/\/mainvps.net\/blog\/ssh-vs-rdp\/\">RDP<\/a> is what makes that possible and port 3389 is the digital door that makes the connection.<\/p>\n\n\n\n<p>But here\u2019s the problem: <strong>this digital door is also a favorite target for hackers<\/strong>. That\u2019s why understanding, monitoring, and securing port 3389 is essential for anyone managing a <a href=\"https:\/\/mainvps.net\/blog\/why-you-should-choose-a-windows-vps-server\/\">Windows-based server<\/a> or system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_RDP_Used_For\"><\/span>What Is RDP Used For?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Accessing a server without needing to be physically present<\/li>\n\n\n\n<li>Performing remote system administration<\/li>\n\n\n\n<li>Helping team members or clients troubleshoot issues<\/li>\n\n\n\n<li>Managing <a href=\"https:\/\/mainvps.net\/vps\">VPS<\/a> and cloud-based hosting environments<\/li>\n\n\n\n<li>Running software on another system from afar<\/li>\n<\/ul>\n\n\n\n<p><strong>In short: RDP is powerful\u2014but with great power comes great responsibility.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Port_3389_Is_a_Security_Risk_If_Left_Unchecked\"><\/span>Why Port 3389 Is a Security Risk (If Left Unchecked)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Leaving RDP exposed on port 3389 without security hardening is like leaving your front door unlocked in a high-crime neighborhood. Here\u2019s why:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Its_Widely_Scanned_by_Bots\"><\/span>1. It\u2019s Widely Scanned by Bots<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Hackers and bots are constantly scanning the internet for open 3389 ports. If they find one, they often try brute-force attacks\u2014guessing usernames and passwords until something works.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Its_Been_Exploited_Before\"><\/span>2. It\u2019s Been Exploited Before<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Remember the <strong>BlueKeep vulnerability (CVE-2019-0708)?<\/strong> That was a serious RDP flaw. If you\u2019re not keeping your systems updated, you could still be vulnerable to it or its cousins.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Its_a_Launchpad_for_Ransomware\"><\/span>3. It\u2019s a Launchpad for Ransomware<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Many ransomware attacks begin with RDP. A single compromised session can lead to a locked-down network, encrypted data, and ransom demands.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Secure_Port_3389_Without_Disabling_RDP_Completely\"><\/span>How to Secure Port 3389 (Without Disabling RDP Completely)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you rely on RDP, you don\u2019t have to ditch it\u2014but you do need to protect it. Here\u2019s how:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_1_Use_a_VPN_to_Hide_Port_3389\"><\/span>\u2705 1. <strong>Use a VPN to Hide Port 3389<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Don\u2019t expose RDP to the public internet. Route your RDP traffic through a <strong>VPN<\/strong> so that only authorized users even see the port exists.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_2_Restrict_Access_by_IP_Address\"><\/span>\u2705 2. <strong>Restrict Access by IP Address<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If only one or two people need RDP access, lock it down by <strong>allowing their IPs<\/strong> in your firewall. This makes it much harder for outsiders to find and exploit.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_3_Change_the_Default_RDP_Port\"><\/span>\u2705 3. <strong>Change the Default RDP Port<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Changing port 3389 to something non-standard won\u2019t make you bulletproof, but it helps avoid script-kiddie scans. Just remember to adjust your firewall and client settings too.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_4_Enable_Network_Level_Authentication_NLA\"><\/span>\u2705 4. <strong>Enable Network Level Authentication (NLA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>NLA requires users to authenticate before a remote session even begins. It\u2019s quick to enable and drastically reduces attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_5_Use_Strong_Passwords_Multi-Factor_Authentication_MFA\"><\/span>\u2705 5. <strong>Use Strong Passwords + Multi-Factor Authentication (MFA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Make brute-force attacks useless. Combine complex passwords with MFA (via smartcards or apps like Microsoft Authenticator).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"%E2%9C%85_6_Patch_Early_Patch_Often\"><\/span>\u2705 6. <strong>Patch Early, Patch Often<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Set up automatic Windows updates or at least patch manually every month. Many RDP attacks rely on unpatched vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bonus_Tip_Use_Log_Monitoring_Alerts\"><\/span>Bonus Tip: Use Log Monitoring &amp; Alerts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Don\u2019t just lock your door\u2014put a camera on it too. Use tools like Windows Event Viewer or centralized logging systems to <strong>monitor failed login attempts<\/strong>, track IPs, and set up alerts for suspicious behavior.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Common_Questions_FAQs\"><\/span>Common Questions (FAQs)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q1_Can_I_completely_disable_port_3389\"><\/span><strong>Q1: Can I completely disable port 3389?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Yes, as long as you do not intend on using RDP. If you use it, consider locking it down rather than outright disabling it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q2_Whats_the_safest_way_to_access_RDP_from_outside_the_network\"><\/span><strong>Q2: What\u2019s the safest way to access RDP from outside the network?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Use a <strong>VPN first<\/strong>, then connect via RDP. This creates an encrypted tunnel and shields the port from public exposure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q3_Is_changing_the_RDP_port_enough_for_security\"><\/span><strong>Q3: Is changing the RDP port enough for security?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>No\u2014it\u2019s only a deterrent. Combine it with <strong>firewall rules, NLA, updates, and MFA<\/strong> for real protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q4_How_do_I_know_if_someones_trying_to_attack_RDP\"><\/span><strong>Q4: How do I know if someone\u2019s trying to attack RDP?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Check your logs. Repeated failed login attempts, strange IPs, or high RDP traffic volumes are red flags.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q5_Are_there_better_alternatives_to_RDP\"><\/span><strong>Q5: Are there better alternatives to RDP?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>For basic remote desktop use, RDP is fine\u2014<strong>as long as it\u2019s secured<\/strong>. But for teams or more sensitive environments, third-party tools like <strong>AnyDesk<\/strong>, <strong>TeamViewer<\/strong>, or <strong>VNC with encryption<\/strong> might offer better logging and control features.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Final_Thoughts_RDP_Is_a_Tool%E2%80%94Use_It_Wisely\"><\/span>Final Thoughts: RDP Is a Tool\u2014Use It Wisely<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Remote Desktop Protocol is exceptionally helpful, but port 3389 can pose a risk if mismanaged. A balance of policies, practices, and tools can help you continue reaping the benefits of RDP without exposing yourself to undue danger.<\/p>\n\n\n\n<p>\u2714\ufe0f Set up a firewall<br>\u2714\ufe0f Use VPNs<br>\u2714\ufe0f Keep your system patched<br>\u2714\ufe0f Monitor what\u2019s going on<\/p>\n\n\n\n<p>Do that\u2014and you\u2019ll sleep better at night knowing your digital front door is locked.<\/p>\n\n\n\n<p><strong>Need secure hosting with RDP access protected by enterprise-level firewalls?<\/strong><br>Check out <a class=\"\" href=\"https:\/\/mainvps.net\">MainVPS.net<\/a> for high-performance <a href=\"https:\/\/mainvps.net\/vps-hosting-india\">VPS hosting in India<\/a>, the USA, and beyond\u2014with built-in DDoS protection and optional RDP hardening.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re managing a Windows server or accessing a desktop remotely, chances are you\u2019re using RDP and that means port 3389 is in play. But what <a class=\"read-more-link\" href=\"https:\/\/mainvps.net\/blog\/rdp-port-3389-security-guide\/\">Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":11580,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-11398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-servers"],"_links":{"self":[{"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/posts\/11398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/comments?post=11398"}],"version-history":[{"count":1,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/posts\/11398\/revisions"}],"predecessor-version":[{"id":11399,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/posts\/11398\/revisions\/11399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/media\/11580"}],"wp:attachment":[{"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/media?parent=11398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/categories?post=11398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mainvps.net\/blog\/wp-json\/wp\/v2\/tags?post=11398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}