{"id":12983,"date":"2019-04-25T09:02:34","date_gmt":"2019-04-25T13:02:34","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=12983"},"modified":"2026-02-16T15:29:05","modified_gmt":"2026-02-16T20:29:05","slug":"ddos-protection-critical","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/","title":{"rendered":"Why DDoS Protection is Critical"},"content":{"rendered":"<h2>Updated April 25, 2019<\/h2>\n<p>&nbsp;<\/p>\n<p>Distributed Denial-of-Service (DDoS) attacks are on the rise, and everyone has a target on their back. That\u2019s why <strong>DDoS protection is no longer an option<\/strong>, but a necessity for anyone trying to prevent downtimes and other headaches \u2013 including a damaged reputation \u2013 that are associated with DDoS attacks.\u00a0 Nowadays web hosting must include DDoS protection, because it&#8217;s critical.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.knownhost.com\/\"><strong>KnownHost<\/strong><\/a> includes <strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\">FREE DDoS protection<\/a><\/strong> with all web hosting plans.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Find out <strong><a href=\"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/\">if you are getting DDoSed with this helpful blog post<\/a><\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>DDoS<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Simply put, <strong>a DDoS attack is an attempt to make a server (or website) unavailable<\/strong> by overwhelming it with traffic from numerous sources. The attack targets a broad range of critical resources from news websites to banks and poses an incredible challenge to ensuring people can access and publish important information. The DDoS attack isn\u2019t however limited to banks and news sites alone; it can also target small businesses, individual websites, political platforms and so on. So technically, no one is immune to DDoS attacks.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How it Happens<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Attackers take time to <strong>create networks of infected machines<\/strong>, called <a href=\"https:\/\/internetofthingsagenda.techtarget.com\/definition\/IoT-botnet-Internet-of-Things-botnet\">botnets<\/a>, by spreading malicious software through websites, social media and emails. They then <strong>manipulate<\/strong> these machines virtually, without their owner\u2019s knowledge or consent, and use them as an army to launch an attack against the target. Some botnets are hundreds, thousands or even millions of computers strong \u2013 an unprotected server stands no chance.<\/p>\n<p>&nbsp;<\/p>\n<p>Botnets can produce <strong>massive floods of traffic<\/strong> to overwhelm a system. The floods can be produced in a range of ways, including having the machine send vast amounts of random data to consume the target\u2019s bandwidth or send more connection requests than the target can handle.<\/p>\n<p>&nbsp;<\/p>\n<p>Unfortunately, almost anyone can get their hands on DDoS-for-hire services through underground markets. Meaning, anyone can pay a small price to silence websites they disagree or are displeased with, or disrupt a company\u2019s online operations.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Types of Attacks<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<h3><strong>Application Layer Attacks<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/application-layer-ddos-attack\/\">Application Layer Attacks<\/a> aim to exhaust the resources of the target and interfere with access to the server or website. Hackers <strong>fill the botnets with a complex request that overwhelms<\/strong> the target server as it tries to process the applications. The command might need large downloads or database access. If the target server receives numerous thousands or millions of such requests within a short time, it can be overwhelmed and either slow down or lock up completely.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Protocol Attacks<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>This type of attack is <strong>focused on the networking layer<\/strong> of the target server or website. Its focus is to overwhelm the table space at the firewall, central network services or load balancer that sends requests to the target. Generally, network service follows the first in first out (FIFO) command, where the computer processes the first request before it goes to the next one. In a DDoS attack, the <strong>queue becomes so large that the machine lacks the resources to handle<\/strong> the first request.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Volumetric Attacks<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>In this attack, the botnet is used to generate a considerable amount of traffic and block the works on the target \u2013 more of like an HTTP Flood attack, but with more exponential response component. Imagine having 20 people order 50 items from the same store at the same time. When such an attack is directed to a server, it increases the response size, and the traffic amount explodes and clogs up the target.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>DDoS Today<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>A 2018 survey by Corero Network Security revealed that more than two-thirds of companies experience between 20-50 DDoS attacks attempts every month. According to 91% of the 327 security professionals surveyed,<strong> DDoS attacks can cost targets up to $50,000 in attack mitigation, lost business and lost productivity<\/strong>. 78% of them stated that the loss of customer confidence and trust were the most damaging effect of such attacks on business.<\/p>\n<p>&nbsp;<\/p>\n<p>DDoS attacks can have an instant and damaging consequence on an organization\u2019s bottom line, both with regards to mitigation costs and lost revenue. Although not all DDoS attacks will cost companies $50,000, having a system come to a halt can <strong>affect customer trust and confidence<\/strong>. It will also influence that ability of salespeople to bring in new clients in the increasingly competitive markets. The attacks result in <strong>lasting damage to the reputation of a company<\/strong> and could hurt the churn and corporate profits and customer loyalty.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Here is <\/strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\"><strong>Why DDoS Protection is Critical<\/strong><\/a><\/h2>\n<p>&nbsp;<\/p>\n<h3><strong>Attacks On the Rise<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>The US DDoS Prevention Survey by <a href=\"#\">IDC Research<\/a> <sub>link offline<\/sub> revealed that more than half of IT security decision-makers had been victims of DDoS attack as many as ten times in 2017. Of this number, 40% lasted for more than 10 hours. These results are in tandem with ATLAS findings, which highlight that there were 7.5 million distributed denial-of-service attacks in 2017 \u2013 <strong>a rate that\u2019s rising at almost the same speed as internet traffic<\/strong>, according to Cisco.<\/p>\n<p>&nbsp;<\/p>\n<p>The rapid growth can be attributed to <strong>three factors: motivation of attackers; accessibility of cheap attack services, and advancement in IoT botnets<\/strong> capabilities.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>DDoS Attacks Evolving<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Not only are more DDoS attacks being launched today, but the attackers are also uncovering new ways to integrate the latest technologies for large-scale attacks. In 2017, the attacks inclined towards big volumes attacks, but 2018 saw the <strong>highest level of attack ever<\/strong> recorded \u2013 the first terabyte per second frequency threat. In Q2 2018, there were 0.7% more attacks bigger than 300Gbps than in Q2 2017. And this is not about to slow down.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>DDoS Disruption<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>As stated earlier, falling victim of these attacks can cost organizations up to $50,000, but the numbers could be more. Attackers are also starting to combine the attacks with other expensive illegal activity that can raise the recovery cost to include <strong>compulsory customer notification, breach reporting, and more complex recovery<\/strong>. According to a post on TechRepublic, 85% of security professionals said that these attacks are sometimes utilized as a distraction during a <strong>data breach<\/strong> activity, while 71% said their company experienced an attack that demanded a <strong>ransom<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>Today\u2019s DDoS attacks are increasingly multilayered and multivector, using a blend of massive volume attacks and stealth infiltration aiming the application later. This is the newest trend in an evolving landscape where perpetrators adapt their services and utilize advanced tools and abilities to try to evade and overcome existing defenses. Organizations need to maintain a consistent vigilance on the methods used to target their systems and constantly adjust their defenses as per the industry standards to stay safe.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated April 25, 2019 &nbsp; Distributed Denial-of-Service (DDoS) attacks are on the rise, and everyone has a target on their back. That\u2019s why DDoS protection is no longer an option, but a necessity for anyone trying to prevent downtimes and other headaches \u2013 including a damaged reputation \u2013 that are associated with DDoS attacks.\u00a0 Nowadays [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[414,2098,107],"class_list":["post-12983","post","type-post","status-publish","format-standard","hentry","category-security","tag-ddos","tag-hacking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why DDoS Protection is Critical - KnownHost<\/title>\n<meta name=\"description\" content=\"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why DDoS Protection is Critical - KnownHost\" \/>\n<meta property=\"og:description\" content=\"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-25T13:02:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T20:29:05+00:00\" \/>\n<meta name=\"author\" content=\"Robb Sands\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robb Sands\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/\"},\"author\":{\"name\":\"Robb Sands\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e6a7331d51d3c6e434f490e4a4de2f44\"},\"headline\":\"Why DDoS Protection is Critical\",\"datePublished\":\"2019-04-25T13:02:34+00:00\",\"dateModified\":\"2026-02-16T20:29:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/\"},\"wordCount\":1094,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"ddos\",\"hacking\",\"security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/\",\"name\":\"Why DDoS Protection is Critical - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2019-04-25T13:02:34+00:00\",\"dateModified\":\"2026-02-16T20:29:05+00:00\",\"description\":\"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ddos-protection-critical\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why DDoS Protection is Critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e6a7331d51d3c6e434f490e4a4de2f44\",\"name\":\"Robb Sands\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/rsands\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why DDoS Protection is Critical - KnownHost","description":"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/","og_locale":"en_US","og_type":"article","og_title":"Why DDoS Protection is Critical - KnownHost","og_description":"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.","og_url":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2019-04-25T13:02:34+00:00","article_modified_time":"2026-02-16T20:29:05+00:00","author":"Robb Sands","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Robb Sands","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/"},"author":{"name":"Robb Sands","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e6a7331d51d3c6e434f490e4a4de2f44"},"headline":"Why DDoS Protection is Critical","datePublished":"2019-04-25T13:02:34+00:00","dateModified":"2026-02-16T20:29:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/"},"wordCount":1094,"commentCount":0,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["ddos","hacking","security"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/","url":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/","name":"Why DDoS Protection is Critical - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2019-04-25T13:02:34+00:00","dateModified":"2026-02-16T20:29:05+00:00","description":"See why DDoS protection is no longer an option. Learn more about DDoS attacks and how to prepare and prevent future attacks.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/ddos-protection-critical\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why DDoS Protection is Critical"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e6a7331d51d3c6e434f490e4a4de2f44","name":"Robb Sands","url":"https:\/\/www.knownhost.com\/blog\/author\/rsands\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/12983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=12983"}],"version-history":[{"count":2,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/12983\/revisions"}],"predecessor-version":[{"id":19880,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/12983\/revisions\/19880"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=12983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=12983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=12983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}