{"id":732,"date":"2019-10-28T14:37:43","date_gmt":"2019-10-28T14:37:43","guid":{"rendered":"http:\/\/blog.hostinger.io\/hostinger-tutorials\/uncategorized\/how-to-check-if-smtp-port-587-is-not-blocked\/"},"modified":"2026-03-09T19:19:29","modified_gmt":"2026-03-09T19:19:29","slug":"smtp-port-587","status":"publish","type":"post","link":"\/ng\/tutorials\/smtp-port-587","title":{"rendered":"How to check if SMTP port 587 is open"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><p>SMTP port 587 helps with email delivery optimization. Unlike traditional email submissions through port 25 or 465, port 587 establishes more secure and authenticated connections between a mail client and server.<\/p><p>However, port 587 is not recognized as the default SMTP port by the Internet Assigned Numbers Authority (IANA), an organization responsible for managing the internet addressing scheme. This can lead to email server connectivity issues, resulting in failed delivery attempts.<\/p><p>Such blockages can affect individual users and organizations relying on internet email communication for various purposes. Consequently, they can hinder business operations, such as project management and customer retention.<\/p><p>This article will guide you through the process of checking if port 587 is open. In cases where the port is obstructed, we&rsquo;ll share several troubleshooting techniques and proper mail server configurations to resolve the issue.<\/p><figure class=\"wp-block-image size-large\"><a href=\"https:\/\/assets.hostinger.com\/content\/tutorials\/pdf\/How-to-Speed-Up-Your-Website-EN.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"566\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/public\" alt=\"\" class=\"wp-image-69260\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=2048,fit=scale-down 2048w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2022\/11\/eBook-Speed-Up-your-website.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a><\/figure><p>\n\n\n\n\n<\/p><h2 class=\"wp-block-heading\" id=\"h-understanding-smtp-port-587\">Understanding SMTP Port 587<\/h2><p>SMTP, or <a href=\"\/ng\/tutorials\/smtp-port\">Simple Mail Transfer Protocol<\/a>, is the foundation of email communication. Its function is for sending and receiving emails, enabling messages to travel across networks from one mail server to another.<\/p><p>Port 587 plays a pivotal role in this process. While older port options support SMTP-related data transmission, port 587 ensures more robust security of outgoing emails.<\/p><p><div class=\"protip\">\n                    <h4 class=\"title\">SMTP Relay and SMTPS<\/h4>\n                    <p>Other port alternatives include ports 25 and 465. Port 25 doesn&rsquo;t require authentication and is the default message relay port. On the other hand, port 465 was originally registered for SMTPS (SMTP over SSL).<br>\n<br>\nSMTP relaying or message relay involves transferring email messages from one mail server to another. The SMTP relay mechanism enables email communication across domains and servers.<br>\n<br>\nPort 465 supports SSL encryption. However, SMTPS over port 465 has been replaced by the more flexible and secure STARTTLS method, commonly used with port 587. Despite its deprecation, some ISPs and hosting service providers still support port 465 for SMTP submission.<\/p>\n                <\/div>\n\n\n\n<\/p><p>Here are two port 587 roles that set it apart from other ports:<\/p><p><strong>Standard Port for Secure Outgoing Emails<\/strong><\/p><p>Port 587 is designated for secure mail submissions to an email server.<\/p><p>Unlike the more traditional message submission ports, port 587 incorporates advanced encryption mechanisms to safeguard sensitive data during mail submissions or transmissions.<\/p><p>It was introduced as an alternative to port 465 and to ensure the new security policy goes well with the traditional relay traffic over port 25.<\/p><p>Therefore, it is often referred to as the standard submission port.<\/p><p>Port 587 utilizes the opportunistic Transport Layer Security (TLS) encryption through the STARTTLS command.<\/p><p>Opportunistic TLS, or STARTTLS, provides an added layer of protection by encrypting the communication channel even when the email transmission initially begins in plain text.<\/p><p>So, when an email client connects to an SMTP server using port 587, the STARTTLS command is issued, prompting the negotiation of a secure encrypted connection between the two parties.<\/p><p>This encryption ensures that the data exchanged between your email client and server remains protected from potential eavesdropping or unauthorized access.<\/p><p><strong>Enhanced Spam Prevention and Reliable Delivery<\/strong><\/p><p>Port 587 is a secure port for sending emails because it requires authentication. Before sending an email, the mail client must identify itself to the mail server. This helps to prevent spam and unauthorized mail submissions.<\/p><p>Spammers often use automated scripts to send large numbers of emails without authentication. By requiring authentication, mail servers can prevent these scripts from being transmitted.<\/p><p>Required authentication helps to ensure that only legitimate users can send emails from a particular account. This helps to prevent unauthorized users from taking over accounts and using them to send spam or phishing emails.<\/p><p>Utilizing port 587 for sending messages also conforms with modern email security standards, supporting higher delivery rates.<\/p><p><div class=\"protip\">\n                    <h4 class=\"title\">Suggested Reading<\/h4>\n                    <p>Head to our article on <a href=\"\/ng\/tutorials\/how-to-create-an-email\">How to Create an Email Account for Professional Use<\/a> to learn about the Hostinger email setup process.<\/p>\n                <\/div>\n\n\n\n<\/p><h2 class=\"wp-block-heading\" id=\"h-how-to-check-if-port-587-is-open\">How to Check if Port 587 Is Open<\/h2><p>Verifying whether port 587 is open is crucial to prevent email communication issues. However, due to ISP port restrictions, there is a chance you might encounter blocked email ports.<\/p><p>If your preferred port is blocked, here are several common error messages that you might encounter:<\/p><pre class=\"wp-block-preformatted\">Closed SMTP connect() failed.\nTimeout::Error (execution expired)\nMailer Error: SMTP connect() failed.\nConnection unexpectedly closed: timed out\nS: SMTP ERROR: QUIT command failed: Connection: closed\n2023&ndash;09&ndash;8 17:13:00 SMTP ERROR: Failed to connect to server: Permission denied (13)<\/pre><p>There are two ways you can conduct a port status check, which we cover below:<\/p><h3 class=\"wp-block-heading\" id=\"h-1-use-command-prompt-terminal\">1. Use Command Prompt\/Terminal<\/h3><p><div><p class=\"important\"><strong>Important!<\/strong> In this tip, we&rsquo;ll use the <strong>telnet<\/strong> command. As a privileged command, it requires administrator rights to run. If you don&rsquo;t have administrator access, your computer won&rsquo;t recognize the command, and you won&rsquo;t be able to run the check.<\/p><\/div>\n\n\n\n<\/p><p><strong>Command Prompt<\/strong> on Windows and <strong>Terminal<\/strong> on macOS and Linux are command-line interfaces enabling users to interact with their computer&rsquo;s operating system using text-based commands.<\/p><p>These tools provide a direct way to execute commands, run scripts, and manage various aspects of the system without relying on a graphical user interface.<\/p><p>Here&rsquo;s how to access Command Prompt on <strong>Windows<\/strong>:<\/p><p>1. Press <strong>Win+R<\/strong>.<\/p><p>2. Type <strong>cmd<\/strong> in the window.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/cmd-run-window.png\"><img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"325\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/cmd-run-window.png\/public\" alt=\"The Run window with cmd typed in the field and highlighted\" class=\"wp-image-94324\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/cmd-run-window.png\/w=560,fit=scale-down 560w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/cmd-run-window.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/cmd-run-window.png\/w=150,fit=scale-down 150w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/figure><\/div><p>3. Click <strong>OK<\/strong> or press <strong>Enter<\/strong>.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/ok-cmd-run-window.png\"><img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"325\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/ok-cmd-run-window.png\/public\" alt=\"The Run window with cmd typed in the field and OK highlighted\" class=\"wp-image-94325\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/ok-cmd-run-window.png\/w=560,fit=scale-down 560w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/ok-cmd-run-window.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/ok-cmd-run-window.png\/w=150,fit=scale-down 150w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/figure><\/div><p>4. You&rsquo;ll arrive on Windows&rsquo; <strong>Command Prompt<\/strong> interface.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1150\" height=\"205\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/public\" alt=\"Windows' command prompt interface\" class=\"wp-image-94334\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/w=1150,fit=scale-down 1150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/windows-command-prompt-interface.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1150px) 100vw, 1150px\" \/><\/a><\/figure><\/div><p>Here&rsquo;s the guide for <strong>macOS <\/strong>users:<\/p><p>1. Press <strong>F4<\/strong> to open the <strong>Launchpad<\/strong>.<\/p><p>2. In the search field, type <strong>Terminal<\/strong>, and press <strong>Enter<\/strong>.<\/p><p>3. The <strong>Terminal<\/strong> app will open.<\/p><p>For<strong> Linux<\/strong> users, utilize the <strong>Ctrl+Alt+T<\/strong> keyboard shortcut to access the <strong>Linux Terminal<\/strong>.<\/p><p>Once you successfully access your device&rsquo;s command-line interface, run the <a href=\"\/ng\/tutorials\/linux-telnet-command\">telnet command<\/a> in the Command Prompt or Terminal window to check if port 587 is open:<\/p><p>1. Type <strong>telnet your-email-server.com 587<\/strong>, and ensure to replace <strong>your-email-server.com<\/strong> with your actual email server&rsquo;s remote host. Hostinger&rsquo;s email server&rsquo;s hostname is <strong>smtp.hostinger.com<\/strong>.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.hostinger.com\/tutorials\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1150\" height=\"140\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/public\" alt=\"Running the telnet command on Windows' command prompt interface\" class=\"wp-image-94811\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/w=1150,fit=scale-down 1150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/the-telnet-command-example-on-windows-command-prompt-interface.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1150px) 100vw, 1150px\" \/><\/a><\/figure><\/div><p>2. Press <strong>Enter<\/strong>. If the port is open, you&rsquo;ll see a <strong>220<\/strong> message.<\/p><figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.hostinger.com\/tutorials\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1130\" height=\"70\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/public\" alt=\"A successful 220 message on Windows' command prompt interface\" class=\"wp-image-94812\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/w=1130,fit=scale-down 1130w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/09\/a-successful-220-message-on-windows-command-prompt-interface.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1130px) 100vw, 1130px\" \/><\/a><\/figure><p>On the other hand, you&rsquo;ll encounter a <strong>connection refused<\/strong> SMTP error message if the port is closed.<\/p><h3 class=\"wp-block-heading\" id=\"h-2-use-online-port-checking-tools\">2. Use Online Port Checking Tools<\/h3><p>Aside from using the <strong>telnet<\/strong> command, you can utilize online port checker tools to verify port connectivity. Here&rsquo;s how to use <a href=\"https:\/\/canyouseeme.org\/\">CanYouSeeMe.org<\/a> to check if port 587 is open:<\/p><p>1. Visit the website and find the port checker input box.<\/p><p>2. Enter your IP address and <strong>587<\/strong> as the port number.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-port-to-check-input-box.png\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"220\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-port-to-check-input-box.png\/public\" alt=\"CanYouSeeMee.org's input box with the Port to Check input box highlighted\" class=\"wp-image-94323\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-port-to-check-input-box.png\/w=630,fit=scale-down 630w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-port-to-check-input-box.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-port-to-check-input-box.png\/w=150,fit=scale-down 150w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><\/figure><\/div><p>3. Click <strong>Check Port<\/strong> or press <strong>Enter<\/strong> to run the test.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-check-port-button.png\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"225\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-check-port-button.png\/public\" alt=\"CanYouSeeMee.org's Check Port button highlighted\" class=\"wp-image-94322\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-check-port-button.png\/w=630,fit=scale-down 630w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-check-port-button.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/canyouseemeorg-check-port-button.png\/w=150,fit=scale-down 150w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><\/figure><\/div><p>If the port is open, you&rsquo;ll receive a positive confirmation. If the port is closed, the tool will indicate a <strong>failure to establish a connection<\/strong> or an <strong>SMTP port timeout<\/strong>.<\/p><h2 class=\"wp-block-heading\" id=\"h-troubleshooting-blocked-smtp-port-587\">Troubleshooting Blocked SMTP Port 587<\/h2><p>Encountering an SMTP error with port 587 blocked can be inconvenient, especially if you use internet email communication for business purposes. Follow these tips to troubleshoot email-sending issues and resolve them:<\/p><h3 class=\"wp-block-heading\" id=\"h-1-check-firewall-settings\">1. Check Firewall Settings<\/h3><p><div><p class=\"important\"><strong>Important!<\/strong> You need to have administrator rights on your computer to troubleshoot blocked ports by modifying the <strong>Firewall<\/strong> settings. This is because port 587 is restricted, and you need administrator access to make changes to it.<\/p><\/div>\n\n\n\n<\/p><p>Firewalls are barriers between your computer and the internet, safeguarding your system from unauthorized access and malicious traffic.<\/p><p>Unfortunately, firewalls can cause an SMTP error as they might block legitimate traffic, including port 587, used for email communication.<\/p><p>For email delivery troubleshooting, you can start by examining your computer&rsquo;s firewall settings. This process can vary based on your operating system.<\/p><p>Follow this guide if you&rsquo;re a <strong>Windows <\/strong>user:<\/p><p>1. Open the <strong>Start<\/strong> menu. Type <strong>Windows Security<\/strong> in the search bar and click on it in the results.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"510\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\/public\" alt=\"The Windows Security search results on Windows\" class=\"wp-image-94333\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-windows-security-search-results-on-windows.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div><p>2. Click on <strong>Firewall &amp; network protection<\/strong>.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"648\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\/public\" alt=\"Firewall &amp; network protection under Windows Security\" class=\"wp-image-94328\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-under-windows-security.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div><p>3. Scroll down and select<strong> Allow an app through firewall<\/strong>.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1190\" height=\"925\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/public\" alt=\"Firewall &amp; network protection with Allow an app through firewall highlighted\" class=\"wp-image-94329\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/w=1190,fit=scale-down 1190w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/firewall-network-protection-with-allow-an-app-through-firewall-highlighted.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1190px) 100vw, 1190px\" \/><\/a><\/figure><\/div><p>4. Find your email client or port 587 entry and ensure it&rsquo;s allowed.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"880\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/public\" alt=\"The allowed app list in the Windows Defender Firewall\" class=\"wp-image-94331\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/w=1080,fit=scale-down 1080w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/the-allowed-app-list-in-the-windows-defender-firewall.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/a><\/figure><\/div><p>On<strong> macOS:<\/strong><\/p><p>1. Open the <strong>Apple <\/strong>menu &rarr;<strong> System Preferences<\/strong> &rarr; <strong>Security &amp; Privacy<\/strong>.<\/p><p>2. Click on the <strong>Firewall<\/strong> tab &rarr; <strong>Firewall Options<\/strong>.<\/p><p>3. Look for your email client or port 587 in the <strong>Allowed Apps<\/strong> list. If it is not listed, click on the <strong>+<\/strong> button and add it.<\/p><p>4. Click <strong>OK<\/strong> to save your changes.<\/p><p>On<strong> Linux:<\/strong><\/p><p>1. Open the <strong>Terminal <\/strong>window.<\/p><p>2. Find the firewall settings command for your distribution.<\/p><ul class=\"wp-block-list\">\n<li>For Ubuntu, use the <strong>ufw<\/strong> command.<\/li>\n\n\n\n<li>For CentOS, use the <strong>firewalld<\/strong> command.<\/li>\n<\/ul><p>3. Add a new rule for port 587.<\/p><ul class=\"wp-block-list\">\n<li>For Ubuntu, use the <strong>ufw allow 587\/tcp<\/strong> command.<\/li>\n\n\n\n<li>For CentOS, use the <strong>firewall-cmd &ndash;add-port=587\/tcp<\/strong> command.<\/li>\n<\/ul><p>4. Ensure the protocol is set to TCP and the port number is 587.<\/p><p>5. Save the changes for the firewall settings.<\/p><h3 class=\"wp-block-heading\" id=\"h-2-verify-router-and-network-configuration\">2. Verify Router and Network Configuration<\/h3><p>Routers and network settings are crucial in determining which ports are accessible. Incorrect configurations can lead to port 587 being blocked, affecting email delivery.<\/p><p>As such, follow these general steps to ensure your router and network aren&rsquo;t causing email communication disruptions:<\/p><p>1. Open your browser and enter your router&rsquo;s IP address &ndash; usually 192.168.1.1 or 192.168.0.1. If either fails, check your router&rsquo;s IP address via the Command Prompt or Terminal window using <strong>ipconfig<\/strong>.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"100\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\/public\" alt=\"Running the ipconfig command on Windows' command prompt interface\" class=\"wp-image-94330\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\/w=900,fit=scale-down 900w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/running-ipconfig-on-windows-command-prompt-interface.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/figure><\/div><p>2. Log in using the router&rsquo;s admin credentials. Refer to the router&rsquo;s manual if needed.<\/p><p>3. Find the <strong>Port Forwarding<\/strong> section on your router&rsquo;s interface. Typically, you can find it under the <strong>Advanced <\/strong>menu.<\/p><p>4. Create a new port forwarding rule for port 587. The process often includes defining the local IP address of the computer running the email client. This ensures incoming emails can reach your device.<\/p><p><div class=\"protip\">\n                    <h4 class=\"title\">Pro Tip<\/h4>\n                    <p>Each router has its own interface, so the steps may vary. If you encounter difficulties, ensure you use the correct IP address, router username, password, and port numbers. You can also restart the router.<\/p>\n                <\/div>\n\n\n\n<\/p><h3 class=\"wp-block-heading\" id=\"h-3-check-for-isp-restrictions\">3. Check for ISP Restrictions<\/h3><p>Internet Service Providers (ISPs) monitor and regulate network traffic to maintain a secure and spam-free environment. Some ISPs might block outgoing port 587 to prevent spam and unauthorized email traffic, leading to issues with sending emails using this port.<\/p><p>If you suspect port 587 is blocked, talk to your ISP&rsquo;s customer support. Inquire about their policies regarding port blocking and whether they can assist you.<\/p><p>If port 587 remains blocked, consider using other ports provided by your email service provider. Common alternatives include port 465 and port 25.<\/p><h2 class=\"wp-block-heading\" id=\"h-using-port-587-at-hostinger\">Using Port 587 at Hostinger<\/h2><p>The email server configuration differs from one hosting service provider to another. Some companies allow port 587, while others might block it and allow other outbound ports. Therefore, checking if your provider&rsquo;s mail server supports your preferred port type is crucial.<\/p><p>Hostinger&rsquo;s <a href=\"\/ng\/business-email\">business email hosting<\/a> setup uses port 465 with TLS encryption as its default SMTP settings. It also allows port 25 as a message relay port.<\/p><?xml encoding=\"utf-8\" ?><figure class=\"wp-block-image size-large\"><a class=\"hgr-tutorials-cta hgr-tutorials-cta-email-hosting\" href=\"\/ng\/business-email\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"300\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/02\/Email-hosting-cta-banner.png\/public\" alt=\"\" class=\"wp-image-77916\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/02\/Email-hosting-cta-banner.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/02\/Email-hosting-cta-banner.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/02\/Email-hosting-cta-banner.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2023\/02\/Email-hosting-cta-banner.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><p>If you <a href=\"\/ng\/tutorials\/how-to-use-hostinger-email\">use Hostinger&rsquo;s email services<\/a> and have encryption issues during the network port testing process, you can opt for port 587. Here&rsquo;s how to modify the SMTP server configuration:<\/p><p>1. Go to your mail client on your website&rsquo;s admin panel. We&rsquo;ll use <strong>WP Mail SMTP<\/strong> as an example.<\/p><p>2. Navigate to the email client configuration settings and choose <strong>Other SMTP<\/strong> in the <strong>Mailer<\/strong> section.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1425\" height=\"565\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/public\" alt=\"WP Mail SMTP's Settings with Other SMTP ticked in the Mailer section\" class=\"wp-image-94335\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/w=1425,fit=scale-down 1425w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/wpmailsmtp-settings-mailers-othersmtp.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1425px) 100vw, 1425px\" \/><\/a><\/figure><\/div><p>3. Fill in the <strong>Other SMTP<\/strong> details with the following setup information:<\/p><pre class=\"wp-block-preformatted\">Hostname: smtp.hostinger.com\nEncryption level: TLS or STARTTLS\nPort number: 587<\/pre><div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"\/tutorials\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1205\" height=\"640\" src=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/public\" alt=\"The Other SMTP documentation field with SMTP host, TLS encryption, and port number filled out\" class=\"wp-image-94326\" srcset=\"https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/w=1205,fit=scale-down 1205w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/w=300,fit=scale-down 300w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/w=1024,fit=scale-down 1024w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/w=150,fit=scale-down 150w, https:\/\/imagedelivery.net\/LqiWLm-3MGbYHtFuUbcBtA\/wp-content\/uploads\/sites\/2\/2019\/10\/other-smtp-documentation.png\/w=768,fit=scale-down 768w\" sizes=\"auto, (max-width: 1205px) 100vw, 1205px\" \/><\/a><\/figure><\/div><h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2><p>Port 587 is among the most secure email server ports, but it&rsquo;s not the default SMTP port of the Internet Assigned Numbers Authority (IANA). Consequently, port 587 often introduces server connectivity and email transmission issues.<\/p><p>To prevent those issues, run SMTP port testing to verify the port 587 connectivity. Here&rsquo;s a short recap on how to perform the check:<\/p><ul class=\"wp-block-list\">\n<li><strong>Use the telnet command.<\/strong> For Windows users, access <strong>Command Prompt<\/strong> to run the telnet command. macOS and Linux users can utilize <strong>Terminal<\/strong>.<\/li>\n\n\n\n<li><strong>Utilize a port checker.<\/strong> CanYouSeeMe.org is one of the most popular tools for running this check.<\/li>\n<\/ul><p>Even when your mail server supports the 587 port, an SMTP-related data transmission error may still occur. This might be connection refused, permission denied, execution expired, or connection unexpectedly closed.<\/p><p>Proper mail server configuration is vital to ensure successful email submissions. You can check your computer&rsquo;s firewall settings for email transmission, verify your router&rsquo;s port forwarding configuration, or consult your ISP for SMTP port 587 restrictions.<\/p><p>In this SMTP connectivity guide, we also shared tips for using port 587 at Hostinger. By following the instructions in this article and setting up the proper configuration, you can enjoy reliable email communication using Hostinger&rsquo;s email server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SMTP port 587 helps with email delivery optimization. Unlike traditional email submissions through port 25 or 465, port 587 establishes more secure and authenticated connections between a mail client and server. However, port 587 is not recognized as the default SMTP port by the Internet Assigned Numbers Authority (IANA), an organization responsible for managing the [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"\/ng\/tutorials\/smtp-port-587\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_title":"How to Check if Port 587 Is Open in %currentyear%","rank_math_description":"Check out this article to learn how to check if SMTP port 587 is open and how to troubleshoot blockages and ensure continuous communication.","rank_math_focus_keyword":"how to check if port 587 is open","footnotes":""},"categories":[22636],"tags":[],"class_list":["post-732","post","type-post","status-publish","format-standard","hentry","category-email"],"hreflangs":[{"locale":"en-US","link":"https:\/\/www.hostinger.com\/tutorials\/smtp-port-587","default":0},{"locale":"fr-FR","link":"https:\/\/www.hostinger.com\/fr\/tutoriels\/port-587","default":0},{"locale":"es-ES","link":"https:\/\/www.hostinger.com\/es\/tutoriales\/puerto-smtp-587","default":0},{"locale":"ja-JP","link":"https:\/\/www.hostinger.com\/jp\/tutorials\/smtp-port-587","default":0},{"locale":"en-UK","link":"https:\/\/www.hostinger.com\/uk\/tutorials\/smtp-port-587","default":0},{"locale":"en-MY","link":"https:\/\/www.hostinger.com\/my\/tutorials\/smtp-port-587","default":0},{"locale":"en-PH","link":"https:\/\/www.hostinger.com\/ph\/tutorials\/smtp-port-587","default":0},{"locale":"es-MX","link":"https:\/\/www.hostinger.com\/mx\/tutoriales\/puerto-smtp-587","default":0},{"locale":"es-CO","link":"https:\/\/www.hostinger.com\/co\/tutoriales\/puerto-smtp-587","default":0},{"locale":"es-AR","link":"https:\/\/www.hostinger.com\/ar\/tutoriales\/puerto-smtp-587","default":0},{"locale":"en-IN","link":"https:\/\/www.hostinger.com\/in\/tutorials\/smtp-port-587","default":0},{"locale":"en-CA","link":"https:\/\/www.hostinger.com\/ca\/tutorials\/smtp-port-587","default":0},{"locale":"en-AU","link":"https:\/\/www.hostinger.com\/au\/tutorials\/smtp-port-587","default":0},{"locale":"en-NG","link":"https:\/\/www.hostinger.com\/ng\/tutorials\/smtp-port-587","default":0}],"_links":{"self":[{"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/posts\/732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/comments?post=732"}],"version-history":[{"count":24,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/posts\/732\/revisions"}],"predecessor-version":[{"id":144986,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/posts\/732\/revisions\/144986"}],"wp:attachment":[{"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/media?parent=732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/categories?post=732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostinger.com\/ng\/tutorials\/wp-json\/wp\/v2\/tags?post=732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}