{"id":13478,"date":"2022-01-12T22:47:50","date_gmt":"2022-01-12T22:47:50","guid":{"rendered":"https:\/\/www.securedyou.com\/?p=13478"},"modified":"2022-01-12T22:47:50","modified_gmt":"2022-01-12T22:47:50","slug":"nmap-commands-list-cheat-sheet","status":"publish","type":"post","link":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/","title":{"rendered":"Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List"},"content":{"rendered":"

\"Nmap<\/p>\n

Nmap stands for Network Mapper. It comes in free and is an open-source tool that is used for vulnerability scanning and network discovery. It is used by all the network administrators to identify which devices are running on the system, discover available hosts and services provided by them, find open ports as well as to detect security risks.<\/p>\n

It can also be used to monitor single hosts and vast networks which encompass many devices and multitudes of subsets.<\/p>\n

Over time it has evolved and is flexible but is a port-scan tool that is used to gather information by sending raw packets towards the system ports. It listens to all the responses sees whether the ports are open, closed, or filtered like a firewall. Port discovery or enumerations are other words that are used for port scanning.<\/p>\n

Recommended:<\/strong> Download Nmap for Windows 10 & 11.<\/a><\/p>\n

How Nmap Commands Work<\/strong><\/h2>\n

\"How<\/p>\n

Packets that are sent out by Nmap return with IP addresses and other data thus allowing the user to identify different attributes of the network giving the user a profile or network map and allowing the creation of an inventory of the software and hardware.<\/p>\n

Now, different protocols use different kinds of packet structures. It is used to employ transport layer protocols including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), SCTP (Stream Control Transmission Protocol) and other supporting protocols like ICMP (Internet Control Message Transmission Protocol) which is used to send error messages.<\/p>\n

Different protocols are used for various purposes and system ports like low resource overhead of UDP is good if you want real-time-streaming video but in this, some packets are lost in return for speed whereas non-real time streaming videos in Youtube is buffered and used much slower, albeit and reliable TCP.<\/p>\n

Its fundamental port scanning and packet capture capabilities are being enhanced constantly.<\/p>\n

100+ Nmap Commands Cheat Sheet – Massive List<\/strong><\/h2>\n

\"Nmap<\/p>\n

Nmap Ping Scan<\/strong><\/h3>\n
Nmap \u2013sp \r\n<\/code><\/pre>\n

This one is quite famous as it is used to perform Nmap ping sweeps. Moreover, this is one of the easiest ways to detect hosts on any network.<\/p>\n

Its only drawback is that at times it blocks IP-based ping packets so if you are not able to get solid results we suggest that you switch to ARP-based requests for the scan.<\/p>\n

Basic Nmap Scan against IP or Host<\/strong><\/h3>\n
Nmap 8.8.8.8\r\n<\/code><\/pre>\n

You need to simply replace IP for the host if you wish to scan hostname:<\/p>\n

Nmap securedyou.com\r\n<\/code><\/pre>\n

These kinds of scans are set perfect when you begin with Nmap.<\/p>\n

    \n
  1. Scan IP Ranges<\/li>\n<\/ol>\n

    It can be used to scan complete CIDR IP ranges such as:<\/p>\n

    Nmap 192.168.5.4\/24\r\n<\/code><\/pre>\n

    This is used to scan consecutive 14 IP ranges starting from 8.8.8.1 to 8.8.8.14.<\/p>\n

    As an alternate the following kind of range can be used:<\/p>\n

    Nmap 1.1.1.2-12\r\n<\/code><\/pre>\n

    Wildcards can also be used to scan complete C class IP range like:<\/p>\n

    Nmap 1.1.1*\r\n<\/code><\/pre>\n

    This shall scan 256 IP addresses ranging from 1.1.1.1 to 1.1.1.256<\/p>\n

    If you wish to exclude specific IPs from the IP range scan then use the \u201c-exclude\u201d option:<\/p>\n

    Nmap \u2013p 1.1.1.* --exclude 1.1.1.2\r\n<\/code><\/pre>\n

    Scanning Most Popular Ports<\/strong><\/h3>\n

    \"OSCP<\/p>\n

    By using \u201c-top-ports\u201d parameter with specified number one can scan top X most common ports for that particular host like:<\/p>\n

    Nmap \u2013top-ports 20 172.168.762<\/p>\n

    Now, we can replace \u201c20\u201d with the desired number, output example is shown below:<\/p>\n

    \r\nNmap \u2013top-ports 20 172.176.22.1\r\n\r\n[root@securedyoushaheer:~]nmap --top-ports 20 localhost\r\n\r\n21\/tcp - For ftp\r\n\r\n22\/tcp - For ssh\r\n\r\n23\/tcp - For telnet\r\n\r\n25\/tcp - For smtp\r\n\r\n53\/tcp - For domain\r\n\r\n80\/tcp - For http\r\n\r\n110\/tcp - For pop3\r\n\r\n111\/tcp - For rpcbind\r\n\r\n135\/tcp - For msrpc\r\n\r\n139\/tcp - For netbios-ssn\r\n\r\n143\/tcp - For imap\r\n\r\n443\/tcp - For https\r\n\r\n445\/tcp - For microsoft-ds\r\n\r\n993\/tcp - For imaps\r\n\r\n995\/tcp - For pop3s\r\n\r\n1723\/tcp - For pptp\r\n\r\n3306\/tcp - For mysql\r\n\r\n3389\/tcp - For ms-wbt-server\r\n\r\n5900\/tcp - For vnc\r\n\r\n8080\/tcp - For http-proxy\r\n<\/code><\/pre>\n

    Disabling DNS Name Resolution<\/strong><\/h3>\n

    If you wish to speed up your scan then you can select disable reverse DNS resolution for all the scans, for this all you need to do is add \u201c-n\u201d parameter. This can also be achieved with Wireshark<\/a>.<\/p>\n

    [root@securedyoushaheer:~]nmap -p 80 -n 1.1.1.1\r\nNormal vs port based DNS scan, the difference is clear:\r\n[root@securitytrails:~]nmap -p 80 1.1.1.1\r\n<\/code><\/pre>\n

    Detect Service\/Daemon Versions<\/strong><\/h3>\n

    For this you need to use \u2013sV parameters:<\/p>\n

    It is as followed:<\/p>\n

    [root@securedyoushaheer:~]nmap \u2013sV localhost\r\n<\/code><\/pre>\n

    Scan Specific Ports or Scan Entire port ranges on Local or Remote server<\/strong><\/h3>\n
    Nmap \u2013p 1-5000 localhost\r\n<\/code><\/pre>\n

    In this we scanned all 65535 ports for the localhost system, this is able to scan all the possible ports but we can also able to scan particular ports which are reported to give out faster results such as:<\/p>\n

    Nmap \u2013p 80,443 1.1.1.1\r\n<\/code><\/pre>\n
      \n
    1. Scan Multiple IP Addresses<\/li>\n<\/ol>\n

      For this the following syntax needs to be used:<\/p>\n

      Nmap 1.1.1.1 8.8.4.4\r\n<\/code><\/pre>\n

      Moreover, consecutive IP addresses can also be scanned:<\/p>\n

      Nmap 8.8.8.8,2,4,7\r\n<\/code><\/pre>\n

      This shall scan 1.1.1.1 , 1.1.1.2 , 1.1.1.3 and 1.1.1.4<\/p>\n

      ALSO CHECK:<\/strong> Download Nmap APK for Android 10, 11 and 12.<\/a><\/p>\n

      Scan Using TCP or UDP Protocols<\/strong><\/h3>\n

      The best thing about this one is that it works both with TCP and UDP protocols. While many services run on TCP users can get a lot of benefits by scanning services based on UDP. Following are some examples:<\/p>\n

      Standard TCP scanning output:<\/p>\n

      [root@securedyoushaheer:~]nmap -sT 192.168.7.11\r\n<\/code><\/pre>\n

      UDP scanning results by using the \u201c-sU\u201d parameter<\/p>\n

      [root@securedyoushaheer:~]nmap -sU localhost\r\n<\/code><\/pre>\n

      Nmap Cheat Sheet PDF Download<\/strong><\/h2>\n

      Below are the above commands and instructions saved in PDF file format.<\/p>\n

      Nmap Cheat Sheet (Latest)<\/span><\/a><\/p>\n

      How To Use Nmap Commands in the terminal<\/strong><\/h2>\n

      \"How<\/p>\n

      Now for network administrators and security auditors, many free network monitoring utilities and free open-source vulnerability scanners are available. What makes this tool different is that along with port scanning it offers other functions as well:<\/p>\n

        \n
      1. OS Detection: With this users can determine OP which is running on the device. Moreover, we can get other details like the name of the vendor, underlying OS, software version and the estimated uptime of the device.<\/li>\n
      2. Network Mapping: This is used to identify devices on the network which is also known as host discovery including routers, switches, servers and how they are connected physically.<\/li>\n
      3. Security Auditing: Once we know the OS version and apps running on network hosts then it helps network managers determine their vulnerability to particular flaws. Now, whenever a vulnerability alert is received by the admin in a particular version of the app like she can scan her network to see either version of the software is running on the network and takes a few steps to patch or even update specific hosts. Scripts are also used to automate tasks like detecting specific vulnerabilities.<\/li>\n
      4. Service Discovery: It is not only able to identify network hosts but acts as mail, name, or web servers and specific app and versions of related software they run.<\/li>\n<\/ol>\n

        Recommended Cheat Sheets and Commands<\/strong><\/h2>\n
          \n
        1. Google Dorks Cheat Sheet – SQL Injections and Credit Cards.<\/a><\/li>\n
        2. Best Secure Coding Tips Cheat Sheet from OWASP.<\/a><\/li>\n
        3. Kali Linux Wifi and Network Hacking Commands.<\/a><\/li>\n
        4. Meterpreter Commands Full List.<\/a><\/li>\n<\/ol>\n

          Conclusion: Nmap Commands Cheat Sheet<\/strong><\/h2>\n

          Nmap<\/a> is the best overall tool for network and host discovery, period. There is no question about this. However, it is not easy to use, complex and requires some command-line knowledge to be used. This is why we put together a detailed Nmap commands list that can be used by anyone as it contains 100+ commands that you can use for a variety of tasks.<\/p>\n","protected":false},"excerpt":{"rendered":"

          Nmap stands for Network Mapper. It comes in free and is an open-source tool that is used for vulnerability scanning and network discovery. It is used by all the network administrators to identify which devices are running on the system, discover available hosts and services provided by them, find open ports as well as to […]<\/p>\n","protected":false},"author":1,"featured_media":13479,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[587,202],"tags":[3509,3511,3508,3510],"yoast_head":"\nNmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou<\/title>\n<meta name=\"description\" content=\"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou\" \/>\n<meta property=\"og:description\" content=\"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\" \/>\n<meta property=\"og:site_name\" content=\"SecuredYou\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/securedyou\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-12T22:47:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2022\/01\/Nmap-Cheat-Sheet-100-Commands.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"514\" \/>\n\t<meta property=\"og:image:height\" content=\"273\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shaheer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@secured_you\" \/>\n<meta name=\"twitter:site\" content=\"@secured_you\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaheer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\"},\"author\":{\"name\":\"Shaheer\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8\"},\"headline\":\"Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List\",\"datePublished\":\"2022-01-12T22:47:50+00:00\",\"dateModified\":\"2022-01-12T22:47:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\"},\"wordCount\":1074,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securedyou.com\/#organization\"},\"keywords\":[\"Nmap Cheat Sheet\",\"nmap cheat sheet pdf\",\"Nmap commands\",\"nmap commands pdf\"],\"articleSection\":[\"Hacking\",\"Network Utilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\",\"url\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\",\"name\":\"Nmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedyou.com\/#website\"},\"datePublished\":\"2022-01-12T22:47:50+00:00\",\"dateModified\":\"2022-01-12T22:47:50+00:00\",\"description\":\"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securedyou.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securedyou.com\/#website\",\"url\":\"https:\/\/www.securedyou.com\/\",\"name\":\"SecuredYou\",\"description\":\"Cyber Security Tips - Guides - How-tos\",\"publisher\":{\"@id\":\"https:\/\/www.securedyou.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securedyou.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securedyou.com\/#organization\",\"name\":\"SecuredYou\",\"url\":\"https:\/\/www.securedyou.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"contentUrl\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"width\":430,\"height\":82,\"caption\":\"SecuredYou\"},\"image\":{\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/securedyou\/\",\"https:\/\/twitter.com\/secured_you\",\"https:\/\/www.instagram.com\/securedyou\/\",\"https:\/\/www.linkedin.com\/company\/secured-you\/\",\"https:\/\/www.pinterest.com\/securedyou\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8\",\"name\":\"Shaheer\",\"description\":\"Shaheer is the founder of SecuredYou. He is a cybersecurity freak and loves anything related to Computers and Technology. Apart from being a tech geek, he loves listening to music and going to the gym.\",\"sameAs\":[\"https:\/\/www.securedyou.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou","description":"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/","og_locale":"en_US","og_type":"article","og_title":"Nmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou","og_description":"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.","og_url":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/","og_site_name":"SecuredYou","article_publisher":"https:\/\/www.facebook.com\/securedyou\/","article_published_time":"2022-01-12T22:47:50+00:00","og_image":[{"width":514,"height":273,"url":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2022\/01\/Nmap-Cheat-Sheet-100-Commands.jpg","type":"image\/jpeg"}],"author":"Shaheer","twitter_card":"summary_large_image","twitter_creator":"@secured_you","twitter_site":"@secured_you","twitter_misc":{"Written by":"Shaheer","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#article","isPartOf":{"@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/"},"author":{"name":"Shaheer","@id":"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8"},"headline":"Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List","datePublished":"2022-01-12T22:47:50+00:00","dateModified":"2022-01-12T22:47:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/"},"wordCount":1074,"commentCount":0,"publisher":{"@id":"https:\/\/www.securedyou.com\/#organization"},"keywords":["Nmap Cheat Sheet","nmap cheat sheet pdf","Nmap commands","nmap commands pdf"],"articleSection":["Hacking","Network Utilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/","url":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/","name":"Nmap Cheat Sheet 2022 (PDF) - 100+ Nmap Commands List - SecuredYou","isPartOf":{"@id":"https:\/\/www.securedyou.com\/#website"},"datePublished":"2022-01-12T22:47:50+00:00","dateModified":"2022-01-12T22:47:50+00:00","description":"This is the most comprehensive Nmap Commands Cheat Sheet available online to date. It can also be downloaded in a PDF list format for reading and access.","breadcrumb":{"@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securedyou.com\/nmap-commands-list-cheat-sheet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securedyou.com\/"},{"@type":"ListItem","position":2,"name":"Nmap Cheat Sheet 2022 (PDF) – 100+ Nmap Commands List"}]},{"@type":"WebSite","@id":"https:\/\/www.securedyou.com\/#website","url":"https:\/\/www.securedyou.com\/","name":"SecuredYou","description":"Cyber Security Tips - Guides - How-tos","publisher":{"@id":"https:\/\/www.securedyou.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securedyou.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securedyou.com\/#organization","name":"SecuredYou","url":"https:\/\/www.securedyou.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","contentUrl":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","width":430,"height":82,"caption":"SecuredYou"},"image":{"@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/securedyou\/","https:\/\/twitter.com\/secured_you","https:\/\/www.instagram.com\/securedyou\/","https:\/\/www.linkedin.com\/company\/secured-you\/","https:\/\/www.pinterest.com\/securedyou\/"]},{"@type":"Person","@id":"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8","name":"Shaheer","description":"Shaheer is the founder of SecuredYou. He is a cybersecurity freak and loves anything related to Computers and Technology. Apart from being a tech geek, he loves listening to music and going to the gym.","sameAs":["https:\/\/www.securedyou.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts\/13478"}],"collection":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/comments?post=13478"}],"version-history":[{"count":0,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts\/13478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/media\/13479"}],"wp:attachment":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/media?parent=13478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/categories?post=13478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/tags?post=13478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}