{"id":11450,"date":"2018-12-10T07:16:48","date_gmt":"2018-12-10T12:16:48","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=11450"},"modified":"2023-03-10T08:49:58","modified_gmt":"2023-03-10T13:49:58","slug":"ddos-protection-resources","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/","title":{"rendered":"DDoS Protection Resources from KnownHost"},"content":{"rendered":"<h2>Updated December 10, 2018<\/h2>\n<p>With these <strong><a href=\"https:\/\/www.knownhost.com\/\">KnownHost<\/a><\/strong> DDoS protection resources, you&#8217;ll understand everything from the fundamentals of what DDoS means, to how DDoS attacks work, determining if you&#8217;re being hit with a DDoS attack, why hackers bother, how you can prevent DDoS attacks and what KnownHost DDoS protection can do for you and your website.<\/p>\n<h2>DDoS Protection Resources<\/h2>\n<h3>DDoS Meaning &#8211; What does DDoS mean exactly?<\/h3>\n<p>On the KnownHost wiki, we give a quick overview explaining <a href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/\">what is DDoS<\/a>.<\/p>\n<p>DDoS protection means putting in place measures to prevent distributed denial of service attacks from exhausting your website hosting available resources, whether that entails network, RAM, drive, software application, operating system or service.<\/p>\n<p>Simply put, DDoS protection is where your web hosting company puts measures in place to prevent your website being knocked offline when it comes under attack from hackers.<\/p>\n<p>The <a href=\"https:\/\/www.coxblue.com\/12-ddos-statistics-that-should-concern-business-leaders\/\">average DDoS attack last year cost<\/a> between $20,000 and $40,000 per hour.<\/p>\n<h3>DDoS Attacks &#8211; Explained<\/h3>\n<p>By using many compromised computers scattered about the world, hackers can launch distributed attacks against servers and web hosting accounts.\u00a0 DDoS attacks aren&#8217;t physical, where weapons like guns and knives are wielded, but rather are simply a series of requests, like when a normal visitor comes to your site and requests a page.\u00a0 But instead of one visitor requesting one page, you end up with hundreds, or thousands, of remotely controlled computers requesting many pages &#8211; effectively flooding your site with more requests than it can handle.<\/p>\n<p>As a website tries to cope with a DDoS attack, its RAM will get filled, it&#8217;s hard drive taxed beyond the ability to cope, databases slow to a crawl and once it reaches a point &#8211; it will stop answering requests completely.\u00a0 It&#8217;s at this point that a website goes offline, throwing up error messages to visitors &#8211; both attackers and legitimate visitors.<\/p>\n<p>The KnownHost blog answers very clearly exactly <a href=\"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/\">how do I know if I&#8217;m getting hit by a DDoS attack<\/a>? Our wiki is a great place to find out about <a href=\"https:\/\/www.knownhost.com\/kb\/proactive-monitoring\/\">proactive monitoring<\/a> and how advanced server management monitoring\u00a0can impact your success.<\/p>\n<h3>DDoS Attacks &#8211; Why hackers do it<\/h3>\n<p>The KnownHost blog explains some of the most common reasons <a href=\"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/\">why hackers do DDoS attacks<\/a>.<\/p>\n<p>There are a lot of reasons really, ranging from street cred (hacking can be a competition and those with the most successful hacks get the most respect from their hacker peers) to profit (hackers can DDoS sites for a competitor, having been paid as mercenaries to take out a particular company or group of them, or hold sites ransom and ask for money in order to stop the attack).<\/p>\n<p><a href=\"https:\/\/dispersivenetworks.com\/blog\/2017\/5\/16\/new-research-reports-reveal-disturbing-ddos-statistics\">98% of DDoS attacks were against large organizations<\/a>.\u00a0 Are you part of the 2%?<\/p>\n<h3>DDoS Protection &#8211; What KnownHost does<\/h3>\n<p>KnownHost, having been in the hosting business for over a decade, with the best uptime in the industry, are all too familiar with DDoS attacks and how to protect against such attacks.\u00a0 Here&#8217;s a quick summary of <strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\">how KnownHost protects our customers against DDoS attacks<\/a><\/strong>.<\/p>\n<p>The essential component of successfully defending against DDoS attacks is by managing the network traffic before those requests hit the target server.\u00a0 KnownHost&#8217;s datacenters are all equipped with extensive network appliances which identify attacks and filter those requests so they do not flood the target server.\u00a0 The following attack types are protected by network appliances:<\/p>\n<ol class=\"flow\">\n<li>UDP Floods<\/li>\n<li>NTP Amplification<\/li>\n<li>DNS Amplification<\/li>\n<li>Syn Flood<\/li>\n<li>Volume Based Attacks<\/li>\n<li>Fragmented Packet Attacks<\/li>\n<\/ol>\n<h3>DDoS Protection &#8211; What isn&#8217;t covered<\/h3>\n<p>Because of the limits of technology, by design, there are certain things that cannot get filtered by network appliances, and hence aren&#8217;t covered by DDoS protection.\u00a0 These are largely known as <a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/application-layer-ddos-attack\/\">Layer 7, or application layer, attacks<\/a>.\u00a0 Here are some examples of attacks not covered by DDoS protective systems:<\/p>\n<ol class=\"flow\">\n<li>Brute force login attacks<\/li>\n<li>XMLRPC floods<\/li>\n<li>Low level HTTP traffic floods<\/li>\n<li>Email \/ Spam Floods<\/li>\n<li>IPv6 Null Route Only<\/li>\n<\/ol>\n<h3>DDoS Protection &#8211; How to mitigate application layer DDoS attacks<\/h3>\n<p>There are a number of means to preventing a flood of application requests, depending on the nature of the request.<\/p>\n<p>As Cloudflare explains, for application requests via UI, a site owner can insert a CAPTCHA challenge, forcing successful completion of a task that&#8217;s extremely difficult to script programmatically, and which generally needs a human in order to get past.<\/p>\n<p>For other types of requests, the server should have firewalls and mod_security implemented at the server level.\u00a0 By using common security best practices, such as these, site owners can prevent a huge number of exploits by hackers.<\/p>\n<p><a href=\"https:\/\/www.incapsula.com\/blog\/application-layer-7-ddos-protection.html\">Incapsula explains their in-depth approach<\/a>, which is one of a number of approaches to handling DDoS requests that fall outside of network appliance protection.<\/p>\n<h3>How to Recover from a DDoS Attack<\/h3>\n<p>In the event you&#8217;ve experienced some difficulties from being hit by a DDoS attack, it is important that you understand <a href=\"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/\">what you can do to recover from a DDoS attack<\/a>.<\/p>\n<h2>Conclusion<\/h2>\n<p>By choosing the right website hosting company, such as fully managed hosting from <strong><a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a><\/strong>, you can have DDoS protection against the most likely methods of attack.\u00a0 Our experienced server admin staff can help you with configuration and hardening as well, to help cover those trickier situations that put your site at risk.<\/p>\n<p>DDoS attacks can be very costly to website owners &#8211; putting their reputation, finances and peace of mind at risk.\u00a0 100% managed hosting at KnownHost is value-priced, high performance and designed to keep you online more than with any other hosting company.\u00a0 Our <a href=\"http:\/\/www.hyperspin.com\/en\/ranking.php?type=2&amp;i=10&amp;d=90&amp;s=10\">Hyperspin online stats prove how effective we are<\/a> at keeping your website up and running, through thick and thin!\u00a0 Note that RocketVPS, the other high uptime host tracked at Hyperspin is a wholly owned KnownHost subsidiary.<\/p>\n<p>All KnownHost plans include DDoS protection. That means <a href=\"https:\/\/www.knownhost.com\/web-hosting\">Web Hosting<\/a>,\u00a0<a href=\"https:\/\/www.knownhost.com\/reseller-hosting\">Reseller Hosting<\/a>,\u00a0<a href=\"https:\/\/www.knownhost.com\/cloud-hosting\">Cloud Hosting<\/a>,\u00a0<a href=\"https:\/\/www.knownhost.com\/vps-hosting\">Managed VPS Hosting<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.knownhost.com\/dedicated-servers\">Dedicated Hosting<\/a> services are all protected by the KnownHost DDoS protection platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated December 10, 2018 With these KnownHost DDoS protection resources, you&#8217;ll understand everything from the fundamentals of what DDoS means, to how DDoS attacks work, determining if you&#8217;re being hit with a DDoS attack, why hackers bother, how you can prevent DDoS attacks and what KnownHost DDoS protection can do for you and your website. [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[1800,414,2098],"class_list":["post-11450","post","type-post","status-publish","format-standard","hentry","category-security","tag-attack","tag-ddos","tag-hacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS Protection Resources from KnownHost - KnownHost<\/title>\n<meta name=\"description\" content=\"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Protection Resources from KnownHost - KnownHost\" \/>\n<meta property=\"og:description\" content=\"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-10T12:16:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T13:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2018\/12\/Hacking-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robb Sands\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robb Sands\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/\"},\"author\":{\"name\":\"Robb Sands\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e6a7331d51d3c6e434f490e4a4de2f44\"},\"headline\":\"DDoS Protection Resources from KnownHost\",\"datePublished\":\"2018-12-10T12:16:48+00:00\",\"dateModified\":\"2023-03-10T13:49:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/\"},\"wordCount\":973,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"attack\",\"ddos\",\"hacking\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/\",\"name\":\"DDoS Protection Resources from KnownHost - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2018-12-10T12:16:48+00:00\",\"dateModified\":\"2023-03-10T13:49:58+00:00\",\"description\":\"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Protection Resources from KnownHost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e6a7331d51d3c6e434f490e4a4de2f44\",\"name\":\"Robb Sands\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/rsands\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS Protection Resources from KnownHost - KnownHost","description":"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Protection Resources from KnownHost - KnownHost","og_description":"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.","og_url":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2018-12-10T12:16:48+00:00","article_modified_time":"2023-03-10T13:49:58+00:00","og_image":[{"width":750,"height":666,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2018\/12\/Hacking-03.jpg","type":"image\/jpeg"}],"author":"Robb Sands","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Robb Sands","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/"},"author":{"name":"Robb Sands","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e6a7331d51d3c6e434f490e4a4de2f44"},"headline":"DDoS Protection Resources from KnownHost","datePublished":"2018-12-10T12:16:48+00:00","dateModified":"2023-03-10T13:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/"},"wordCount":973,"commentCount":0,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["attack","ddos","hacking"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/","url":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/","name":"DDoS Protection Resources from KnownHost - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2018-12-10T12:16:48+00:00","dateModified":"2023-03-10T13:49:58+00:00","description":"Get in depth explanation of DDoS attacks and DDoS protection. Learn more on how KnownHost can protect your website from unwanted attacks.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS Protection Resources from KnownHost"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e6a7331d51d3c6e434f490e4a4de2f44","name":"Robb Sands","url":"https:\/\/www.knownhost.com\/blog\/author\/rsands\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/11450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=11450"}],"version-history":[{"count":1,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/11450\/revisions"}],"predecessor-version":[{"id":18402,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/11450\/revisions\/18402"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=11450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=11450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=11450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}