{"id":1722,"date":"2017-03-08T00:28:36","date_gmt":"2017-03-08T05:28:36","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=1722"},"modified":"2026-01-26T11:37:41","modified_gmt":"2026-01-26T16:37:41","slug":"know-getting-hit-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/","title":{"rendered":"How to Know if You Are Getting Hit with a DDoS Attack"},"content":{"rendered":"<ul>\n<li><strong>Unveiling of the People behind Mirai<\/strong><\/li>\n<li><strong>Army of Thermostats and Routers Attacks<\/strong><\/li>\n<li><strong>How Do You Know if You Are Getting Hit by a DDoS?<\/strong><\/li>\n<li><strong>5 Steps to Defend Yourself from DDoS<\/strong><\/li>\n<li><strong>Now More than Ever<\/strong><\/li>\n<\/ul>\n<p>Many people know Dyn as the domain name system (DNS) infrastructure provider that was taken off the Internet by a record-breaking distributed denial of service (DDoS) attack. Interestingly enough, there is a prominent piece on surviving DDoS attacks that was written by Dyn director of operations and client services David Grange back in 2014. The attack on Dyn was successful, but it was the largest DDoS of all time; so Grange\u2019s comments are valid and are broad enough that they are still highly relevant.<\/p>\n<p>In exploring the thoughts provided by Grange, we will be answering the questions, \u201cHow do you know if you are getting hit by a DDoS?\u201d and \u201cHow do you defend yourself from DDoS?\u201d But first, let\u2019s look at the pivotal malware that made DDoS such a particularly important aspect of cybercrime in 2017: Mirai.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Unveiling of the People behind Mirai<\/strong><\/h3>\n<p>The problem with attacking an investigative security journalist with your malware is obvious: you just might get their attention. That\u2019s definitely what happened when a DDoS malware developer went after former Washington Post IT security reporter Brian Krebs.<\/p>\n<p>Krebs got hit by a DDoS attack in September \u2013 a massive one. In November 2016, a huge section of the Internet went down because of an attack using the same botnet. Krebs used his training as a reporter and investigated; and he has confidently fingered the culprit. Krebs cited various sources to make a reasonably solid case that the individual behind Mirai is Rutgers student Paras Jha \u2013 also, somewhat incredibly, the owner of Protraf Solutions, <em>a DDoS prevention service<\/em>.<\/p>\n<p>Approximately a week following the DDoS attack of Krebs&#8217; site, a malware author (Jha, in Krebs\u2019 opinion) released the source code for their incredibly powerful zombie botnet of IoT devices, Mirai.<\/p>\n<p>The open sourcing led to additional attacks, explained David Lumb of <a href=\"https:\/\/www.engadget.com\/2017\/01\/19\/krebs-pinpoints-the-likely-author-of-the-mirai-botnet\/\">Engadget<\/a> on January 19. &#8220;But it also gave Krebs the first clue in their long road to uncover Anna Senpai&#8217;s real-life identity \u2013 an investigation so exhaustive&#8230; Krebs made a glossary of cross-referenced names and terms along with an incomplete relational map.\u201d<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Army of Thermostats and Routers Attacks<\/strong><\/h3>\n<p>The unveiling of the guy who is supposedly behind this operation is somewhat of a distraction from the general trend of DDoS, which continues to rise. What\u2019s particularly notable about this attack from a threat perspective is its vast scope. The attack started on the evening of September 20, at about 8 p.m. ET. It measured 620 Gigabits per second. What was actually troubling about the attack wasn\u2019t just that incredible scale but that it appeared to come from a massive army of hacked devices.<\/p>\n<p>To understand this attack on Krebs and Mirai itself, it helps to look back at a previous major DDoS attack against a European media company that hit 363 Gbps. That attack was believed to have been produced by a botnet, but using various methods to <em>amplify<\/em> a small attack into having greater scale. The DDoS tactic of amplification is a type of reflection \u2013 in which the perpetrator is trying to create a flood of responses to a spoofed IP address (which is that of the target). In the case of the Krebs DDoS, it wasn\u2019t amplification or reflection.<\/p>\n<p>On the contrary, \u201cmany were garbage Web attack methods that\u00a0require a legitimate connection between the attacking host and the target, including SYN, GET and POST floods,\u201d explained Brian Krebs. There was one that did not fit that bill, though: traffic that was imitating generic routing encapsulation (GRE) packets \u2013 a protocol that is used to communicate directly between two network nodes (to allow sharing of data between peers without use of a public network).<\/p>\n<p>An attacker can easily spoof DNS traffic, but that is not the case with GRE traffic, or with the garbage methods described by Krebs. Basically, the high amount of traffic of these types seen in <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\">early analysis<\/a> of the DDoS pointed to the fact that a large number of hacked systems were used \u2013 hundreds of thousands of them. It\u2019s now recognized that the collection of systems that was used was actually the Mirai botnet.<\/p>\n<p>Following the attack on Krebs and the open-sourcing of Mirai\u2019s code, another major assault occurred \u2013 this one of a DNS provider, Dyn. The Dyn DDoS, which occurred in October, was \u2013 similarly to the Krebs attack \u2013 the work of more than 100,000 devices. These are Internet of Things devices such as webcams, thermostats, and routers, but they can pack a punch in numbers, as is clear in the 1.2 terabits per second (Tbps) of power they delivered to Dyn.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>How Do You Know if You Are Getting Hit by a DDoS?<\/strong><\/p>\n<p>What does this story have to do with you? DDoS is becoming increasingly commonplace, so \u2013 unfortunately \u2013 many companies are having to ask themselves the question, \u201cAm I getting hit by a DDoS?\u201d or \u201cWhat would I do if I were hit by a DDoS?\u201d<\/p>\n<p>The confusing thing about identifying a DDoS is that it isn\u2019t easy to tell if the spike in traffic is legitimate users or an actual distributed denial of service effort, noted <a href=\"http:\/\/www.itproportal.com\/2014\/03\/06\/how-tell-if-youve-been-hit-ddos-attack-and-how-respond\/\">Dyn\u2019s Grange<\/a>. \u201cThe key to telling the difference lies in the length of time the service is down \u2013 if slow or denied service continues for days rather than a spike during a campaign it is time to start to look into what\u2019s going on.\u201d<\/p>\n<p>Another way to tell something malicious is occurring is when you see that a source continues to query a certain set of data long after the time to live (TTL) has elapsed. (TTL, also called hop limit, is any means by which the amount of time data stays on a network or computer is controlled \u2013 discarding data after the determined timespan has passed.)<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>5 Steps to Defend Yourself from DDoS<\/strong><\/h3>\n<p>What are some proactive steps you can take to protect yourself from Mirai and other DDoS attacks? Here is Grange\u2019s advice:<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>#1 \u2013 Focus on awareness.<\/em> Track your network\u2019s normal activity carefully so that you recognize when anything is amiss and a DDoS might be occurring.<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>#2 \u2013 Improve your capacity.<\/em> Be certain your capacity is high enough to carry the load, and optimize for performance during spikes. Architect with mitigation in mind.<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>#3 \u2013 Run drills.<\/em> Go through drills with your staff so everyone is ready if you do experience a DDoS.<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>#4 \u2013 Use an outside provider. <\/em>Many companies reasonably decide that they do not want to deal with the DDoS challenge internally, so they partner with third parties.<\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><em>#5 \u2013 Err on the side of preparation.<\/em> \u201c[F]igure out the impact it would have on your company financially if it were to happen,\u201d said Grange. \u201c[T]he cost associated with being attacked is usually much higher than the cost to take safeguards.\u201d<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Now More than Ever<\/strong><\/h3>\n<p>Clearly, following the rise of Mirai and these high-profile mega-attacks, it is more important than ever to make sure you have defenses in place so that DDoS can\u2019t sideline your operations. At <strong><a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a><\/strong>, we offer free DDoS protection with all of our VPS hosting packages. <strong><a href=\"https:\/\/www.knownhost.com\/managed-vps\">Check out our Managed VPS Plans.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unveiling of the People behind Mirai Army of Thermostats and Routers Attacks How Do You Know if You Are Getting Hit by a DDoS? 5 Steps to Defend Yourself from DDoS Now More than Ever Many people know Dyn as the domain name system (DNS) infrastructure provider that was taken off the Internet by a [&hellip;]<\/p>\n","protected":false},"author":137,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[414,1496,890],"class_list":["post-1722","post","type-post","status-publish","format-standard","hentry","category-security","tag-ddos","tag-defense","tag-mirai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Know if You Are Getting Hit with a DDoS Attack - KnownHost<\/title>\n<meta name=\"description\" content=\"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos&#039;d and methods to deal with it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Know if You Are Getting Hit with a DDoS Attack - KnownHost\" \/>\n<meta property=\"og:description\" content=\"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos&#039;d and methods to deal with it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-08T05:28:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T16:37:41+00:00\" \/>\n<meta name=\"author\" content=\"Jerry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/\"},\"author\":{\"name\":\"Jerry\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\"},\"headline\":\"How to Know if You Are Getting Hit with a DDoS Attack\",\"datePublished\":\"2017-03-08T05:28:36+00:00\",\"dateModified\":\"2026-01-26T16:37:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/\"},\"wordCount\":1220,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"ddos\",\"defense\",\"mirai\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/\",\"name\":\"How to Know if You Are Getting Hit with a DDoS Attack - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2017-03-08T05:28:36+00:00\",\"dateModified\":\"2026-01-26T16:37:41+00:00\",\"description\":\"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos'd and methods to deal with it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/know-getting-hit-ddos-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Know if You Are Getting Hit with a DDoS Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\",\"name\":\"Jerry\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/jerrysteadydemand-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Know if You Are Getting Hit with a DDoS Attack - KnownHost","description":"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos'd and methods to deal with it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"How to Know if You Are Getting Hit with a DDoS Attack - KnownHost","og_description":"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos'd and methods to deal with it.","og_url":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2017-03-08T05:28:36+00:00","article_modified_time":"2026-01-26T16:37:41+00:00","author":"Jerry","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Jerry","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/"},"author":{"name":"Jerry","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc"},"headline":"How to Know if You Are Getting Hit with a DDoS Attack","datePublished":"2017-03-08T05:28:36+00:00","dateModified":"2026-01-26T16:37:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/"},"wordCount":1220,"commentCount":6,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["ddos","defense","mirai"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/","url":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/","name":"How to Know if You Are Getting Hit with a DDoS Attack - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2017-03-08T05:28:36+00:00","dateModified":"2026-01-26T16:37:41+00:00","description":"Are you under attack? What can you do about it? Here are some ways of telling if you are being Ddos'd and methods to deal with it.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/know-getting-hit-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Know if You Are Getting Hit with a DDoS Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc","name":"Jerry","url":"https:\/\/www.knownhost.com\/blog\/author\/jerrysteadydemand-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=1722"}],"version-history":[{"count":2,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1722\/revisions"}],"predecessor-version":[{"id":19829,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1722\/revisions\/19829"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=1722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=1722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=1722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}