{"id":60172,"date":"2024-10-18T18:18:17","date_gmt":"2024-10-18T17:18:17","guid":{"rendered":"https:\/\/proxidize.com\/?post_type=blog&#038;p=60172"},"modified":"2025-10-02T12:22:25","modified_gmt":"2025-10-02T11:22:25","slug":"6-myths-about-what-someone-can-do-with-your-ip","status":"publish","type":"blog","link":"https:\/\/proxidize.com\/blog\/6-myths-about-what-someone-can-do-with-your-ip\/","title":{"rendered":"6 Myths About What Someone Can Do with Your IP Address"},"content":{"rendered":"\n<p>Having someone send you your IP can be a scary interaction. It\u2019s invasive and feels inherently threatening. Fears and worst-case scenarios might come to mind of what someone can do with your IP: they can figure out who you are, where you live, and do all sorts of hacking things.<\/p>\n\n\n\n<p>In reality, they can&#8217;t do much. Despite what you may read online, even from reputable sources, someone stealing your IP is not the grave threat it used to be. Most of the things you\u2019ll read on the topic are nothing more than fear mongering or incomplete, insufficiently contextualized information designed to generate clicks.<\/p>\n\n\n\n<p>This article will go over some of the ways someone might discover your <a href=\"https:\/\/proxidize.com\/blog\/what-is-an-ip-address\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/IP_address\" rel=\"noreferrer noopener\">IP address<\/a> and shoot down some of the common myths about what that information can be used for. We will also include some methods you can use to obscure your IP.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized centered\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-1024x576.png\" alt=\"A drawing of a person sitting on a laptop working on a laptop under the title &quot;What is My IP Address?&quot;\" class=\"wp-image-60171\" style=\"object-fit:cover\" srcset=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-1024x576.png 1024w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-300x169.png 300w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-768x432.png 768w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-1536x864.png 1536w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address-600x338.png 600w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/whats-my-ip-address.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is My IP Address?<\/h2>\n\n\n\n<p>There are two variations of IP addresses, there is the public IP address and the private IP address. In short, the private IP address is the address assigned to devices on your network by your router, which allows all your devices (phone, computer, printer, etc.) to communicate with your router and thereby access the wider internet. The other IP is your public address; this is the one that identifies you on the internet and is assigned to your router by your ISP.<\/p>\n\n\n\n<p>Through <a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_address_translation\" target=\"_blank\" rel=\"noreferrer noopener\">network access translation<\/a>, or NAT, your router does what its name suggests by routing data from your device to the internet and vice versa. This also means that the private IP of your device is never visible to anyone outside of your local network.<\/p>\n\n\n\n<p>Before we go into how someone could discover what your public IP address is, let us explain how you can find it on your own.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">On Microsoft Devices:&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to the Settings application and enter the Network and Internet tab.&nbsp;<\/li>\n\n\n\n<li>Once there, click on Wi-Fi. You will see the name of the Wi-Fi network you are connected to followed by the word \u201cProperties\u201d (eg: HomeWiFi properties). Click on that and scroll to the bottom.&nbsp;<\/li>\n\n\n\n<li>You will see a list of descriptors such as SSID, Protocol, Network ban, and Link speed. Right under \u201cLink speed\u201d you will see two numbers following \u201cIPv6 Address\u201d. The first string of numbers is your public IP address.&nbsp;<\/li>\n<\/ol>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">On iOS Devices:&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Head to the Settings application and click on Wi-Fi.&nbsp;<\/li>\n\n\n\n<li>Click on the \u201ci\u201d icon next to the network that you are connected to.&nbsp;<\/li>\n\n\n\n<li>You will see categories for IPv4 Address, IPv6 Address, DNS, and HTTP Proxy. Under IPv6 Address, there is a tab labeled \u201cIP Address\u201d. Click on that tab. The first string of digits is your public IP address.&nbsp;<\/li>\n<\/ol>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">On macOS Devices:&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Click on the Apple logo on the top left corner of the screen and navigate to the System Preferences tab.&nbsp;<\/li>\n\n\n\n<li>Make your way over to the Network button. Once there, go to advanced on the bottom right corner.&nbsp;<\/li>\n\n\n\n<li>After that, click on the second tab titled \u201cTCP\/IP\u201d. You should see the IPv6 address there. However, if it does not appear to you at first, follow these steps:\n<ol class=\"wp-block-list\">\n<li>&nbsp;Make sure to toggle the \u201cConfigure IPv6\u201d selector to \u201cAutomatically\u201d.&nbsp;<\/li>\n\n\n\n<li>Click OK, and then Apply. After the changes have been made, go back to Advanced, TCP\/IP, and it should show up.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">On Android Devices:&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to the Settings application and head on to Connections and then Wi-Fi.<\/li>\n\n\n\n<li>Tap on the Wi-Fi settings of your current network and then tap on View More.&nbsp;<\/li>\n\n\n\n<li>Finally, scroll all the way to the bottom. Your public IP should be the last number on the list.&nbsp;<\/li>\n<\/ol>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>It must be stated that this method was tested on a Samsung S24+. Instructions might vary depending on your Android devices.&nbsp;<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">On a Web Browser<\/h3>\n\n\n\n<p>Instead of going through all these steps and figuring out what your own IP is, you could just open up a browser and visit any of these websites. They should tell you what your public and private IP addresses are along with other information. If you have a VPN or a proxy, visiting these websites is a great way to guarantee that the service is working as it should.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.whatismyip.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">What Is My IP<\/a>: Check for the \u201cMy Public IPv6\u201d for the public address.<\/li>\n\n\n\n<li><a href=\"https:\/\/whatismyipaddress.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">What Is My IP Address<\/a>: Shows you your general geolocation. A great way to ensure a VPN or proxy is placing you in another country.<\/li>\n\n\n\n<li><a href=\"http:\/\/ip.me\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IP.me<\/a>: Similar to the above, shows you the city, country, and rough coordinates of your IP.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.avast.com\/what-is-my-ip#pc\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Avast<\/a>: Simple and straightforward. Shows you your public IP.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized centered\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-1024x576.png\" alt=\"A diagram under the title &quot;How Someone Can Find Your IP Address&quot;.\" class=\"wp-image-60169\" style=\"object-fit:cover\" srcset=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-1024x576.png 1024w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-300x169.png 300w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-768x432.png 768w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-1536x864.png 1536w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address-600x338.png 600w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-someone-can-find-your-ip-address.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Someone Can Find Your IP Address<\/h2>\n\n\n\n<p>You use your IP in every single interaction you have online. Any time you visit a website, you broadcast your IP to that site\u2019s server in order to establish a connection. This information is generally not available to third parties for a variety of security reasons.<\/p>\n\n\n\n<p>Let\u2019s explore the most common ways someone can find your IP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Visiting a Website<\/h3>\n\n\n\n<p>Websites log IPs for the purpose of security. This creates an access history that can track which IPs have visited the website. The most common use of an IP in this context is the ability to ban or rate limit an IP that is flagged as engaging in fraudulent or suspicious activity.<\/p>\n\n\n\n<p>When you visit a suspicious website or one operated by bad actors, your IP is broadcast also to them simply by visiting the website.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email<\/h3>\n\n\n\n<p>Clicking on links sent by bad actors can inform them of your IP. These emails can also include malware or other software that can lead to remote access to your device, and more, but this is a danger not directly tied to your IP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Online Advertisements<\/h3>\n\n\n\n<p>When you click on an online advertisement, it redirects you to a webpage. In cases of seemingly benign yet actually malicious adverts, bad actors can then see your IP and track it or use it for malicious purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Online Forms &amp; Registration<\/h3>\n\n\n\n<p>When filling out a form online or registering for an account on a website, the user\u2019s IP address is stored primarily to prevent spam. Filling in a fake or malicious form can allow bad actors to get your IP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Peer-to-Peer Communications<\/h3>\n\n\n\n<p>Some online platforms, particularly P2P applications like VoIP services and torrent clients, establish direct connections between devices, which can expose your IP to the other parties involved.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Online Gaming<\/h3>\n\n\n\n<p>Online games solve multiplayer in a variety of ways. One way is to host servers themselves to which users connect. Others, however, require the players themselves to host servers, to which other players connect. In this case, connecting to a player\u2019s server exposes your IP address to them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Social Engineering<\/h3>\n\n\n\n<p>A bad actor can trick you into revealing your IP address by asking you to visit a website they control or to run a diagnostic tool that reveals it. Be wary of anyone asking you to do anything online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Connecting to a Public WiFi Network<\/h3>\n\n\n\n<p>By connecting to a public WiFi network, others on the same network can discover your (private) IP address with a variety of network scanning tools. This is especially dangerous if the network doesn\u2019t have strong security measures or if you set your device to trust the network when you shouldn\u2019t.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Downloading Malicious Software<\/h3>\n\n\n\n<p>By downloading malicious software you open your system up to a whole variety of dangers, least of which is broadcasting your IP to whoever controls the software. More often than not, however, this will be the least of your concerns, as bad actors will be able to achieve much more than that in this scenario.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized centered\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-1024x576.png\" alt=\"A drawing of a laptop under the title &quot;What Can Someone do With Your IP Address?&quot;\" class=\"wp-image-60170\" style=\"object-fit:cover\" srcset=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-1024x576.png 1024w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-300x169.png 300w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-768x432.png 768w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-1536x864.png 1536w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address-600x338.png 600w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/what-can-someone-do-with-your-ip-address.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Can Someone Do With Your IP Address?<\/h2>\n\n\n\n<p>Someone has found out your IP address. What can they do with it? There are many sources online that will tell you all about the dangers of a stolen IP. Let\u2019s go through six of the most common ones and discuss their actual implications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can Track Your Location<\/h3>\n\n\n\n<p><strong>Claim:<\/strong> You can find someone\u2019s exact location from their IP.<\/p>\n\n\n\n<p><strong>Reality:<\/strong> An IP address can offer a general geographic region where that IP is used. This can vary wildly in both area and accuracy. For example, my IP encompasses a region in which almost six million people live. An IP address alone is not enough to pinpoint anyone\u2019s exact location and can at best be part of the puzzle. Much more personal information is needed, which is usually acquired from other sources like social media accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can Track Your Activity<\/h3>\n\n\n\n<p><strong>Claim: <\/strong>Your IP address can be used to track your online activity.<\/p>\n\n\n\n<p><strong>Reality: <\/strong>This is only true within the bounds of a website and is disproportionately benign. Web administrators can track the activities of a user across the site\u2019s different pages, which is a useful way to identify patterns of use, interest in content, and more. This is also how suspicious activity is identified and blocked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can DDoS You<\/h3>\n\n\n\n<p><strong>Claim:<\/strong> Bad actors can use a distributed denial of service (DDoS) attack on you if they know your IP.<\/p>\n\n\n\n<p><strong>Reality:<\/strong> This is true. By pinging your IP, a bad actor can force your device to send a response. Multiply this many, many times from multiple devices and they can overwhelm your network by tying up all its resources in responding to the pings. This is most commonly achieved with botnets or in collaboration with many other people.<\/p>\n\n\n\n<p><strong>Fun Fact:<\/strong> This is similar to how small websites that gain sudden popularity can go down after they receive what is euphemistically called the \u201chug of death\u201d. When thousands \u2014 or millions \u2014 of people try to visit a website whose servers are not designed to accommodate that much traffic, it can crash the site.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can Impersonate You<\/h3>\n\n\n\n<p><strong>Claim: <\/strong>If someone knows your IP they can impersonate you online.<\/p>\n\n\n\n<p><strong>Reality:<\/strong> Your IP alone is not enough \u2014 and in most cases not needed \u2014 to impersonate you online. To impersonate someone online, bad actors need access to your personal information, most often taken from social media accounts using information you yourself have offered up for free.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can Sell Your IP Address<\/h3>\n\n\n\n<p><strong>Claim:<\/strong> Your IP will be sold to bad actors.<\/p>\n\n\n\n<p><strong>Reality:<\/strong> As discussed throughout this article, knowledge of an IP address is both necessary to surf the internet and useless in isolation in terms of malicious activity. What <em>is<\/em> valuable is <em>access<\/em> to your device, which once gained by bad actors can be auctioned off to third parties.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">They Can Hack You<\/h3>\n\n\n\n<p><strong>Claim:<\/strong> A hacker can gain access to your device or network by knowing your IP.<\/p>\n\n\n\n<p><strong>Reality: <\/strong>A would-be hacker could scan your device for open ports and your device via unprotected ports or by exploiting outdated services. However, you can keep yourself protected from this by keeping your operating system, firewall, and antivirus software up to date.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized centered\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-1024x576.png\" alt=\"A drawing of a person at a laptop next to a padlock and a light bulb under the title &quot;How Can I Protect My IP?&quot;\" class=\"wp-image-60168\" style=\"object-fit:cover\" srcset=\"https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-1024x576.png 1024w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-300x169.png 300w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-768x432.png 768w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-1536x864.png 1536w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip-600x338.png 600w, https:\/\/proxidize.com\/wp-content\/uploads\/2024\/10\/how-can-i-protect-my-ip.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Can I Protect My IP?<\/h2>\n\n\n\n<p>What if you\u2019ve read this article and decided you still don\u2019t want to run the risk? What if you want to hide your IP when you surf the internet? There are two easy ways to do this.<\/p>\n\n\n\n<p>First, you could use a proxy. With a <a href=\"https:\/\/proxidize.com\/proxy-server\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/proxidize.com\/proxy-server\/\" rel=\"noreferrer noopener\">proxy server<\/a>, you can access the internet via your proxy\u2019s IP address as all your internet traffic is routed through the server. This keeps your real IP address hidden.<\/p>\n\n\n\n<p>Second, you could use a virtual private network (VPN). A VPN also involves routing all your traffic through a server, which hides your IP address.<\/p>\n\n\n\n<p>While we don\u2019t go into <a href=\"https:\/\/proxidize.com\/proxy-server\/vpn-vs-proxy\/\" target=\"_blank\" rel=\"noreferrer noopener\">the differences between a proxy and a VPN<\/a> in this article, it&#8217;s important to avoid the urge to use a free VPN or free proxy, as both present a far greater danger than any exposed IP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Despite what you might read online, someone having access to your IP address isn\u2019t the worst-case-scenario many make it out to be. It is also not the glaring danger it may once have been in the past. You use and broadcast your IP countless times as you surf the internet. In the unlikely event a bad actor finds out your IP there is only a limited amount of things they can do with it.<\/p>\n\n\n\n<p>For most of the apocalyptic scenarios, a bad actor will need much more than your IP. Many of us put much more dangerous information about ourselves online every day without ever stopping to think of the consequences. With basic vigilance and safety precautions like not clicking on suspicious links, you can keep yourself safe online even if someone knows your IP.<\/p>\n\n\n\n<p>By using a VPN or a proxy you can keep even that information from anyone who might intend you harm online. Avoid clicking on advertisements that seem suspicious, do not open suspicious emails, and do not click on links you\u2019re unsure of.<\/p>\n","protected":false},"author":2627,"featured_media":75958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","categories":[263],"tags":[],"class_list":["post-60172","blog","type-blog","status-publish","format-standard","has-post-thumbnail","hentry","category-proxies-and-anonymity"],"acf":[],"_links":{"self":[{"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/blog\/60172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/users\/2627"}],"replies":[{"embeddable":true,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/comments?post=60172"}],"version-history":[{"count":5,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/blog\/60172\/revisions"}],"predecessor-version":[{"id":84889,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/blog\/60172\/revisions\/84889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/media\/75958"}],"wp:attachment":[{"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/media?parent=60172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/categories?post=60172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proxidize.com\/wp-json\/wp\/v2\/tags?post=60172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}