{"id":439,"date":"2021-06-30T07:27:51","date_gmt":"2021-06-30T12:27:51","guid":{"rendered":"https:\/\/www.knownhost.com\/kb\/?p=439"},"modified":"2026-01-23T06:35:29","modified_gmt":"2026-01-23T12:35:29","slug":"what-is-a-ddos","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/","title":{"rendered":"What is a distributed denial of service (DDoS) &#038; How to prevent it?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 ez-toc-wrap-right counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #212121;color:#212121\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #212121;color:#212121\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#how_does_a_ddos_attack_work\" >How does a DDoS attack work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#am_i_protected_from_ddos_attacks\" >Am I protected from DDoS attacks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#what_do_i_do_if_i_receive_a_ddos_attack\" >What do I do if I receive a DDoS attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#how_do_i_protect_myself\" >How do I protect myself?<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>There are two types of denial of service events. You have your denial of service(DoS) event and then your distributed denial of service event(DDoS). The difference between these two is how many connections are utilized during the attack. A DoS will use a single connection to hit a website, an example being &#8220;Slow Loris&#8221;. DDoS utilizes multiple connections to hit a website, usually in the form of botnets. Technically, many of these attacks are similar and can be seen using more than one form of malicious traffic.<\/p>\n\n\n\n<div id=\"block-a3897f-1a3b-41\" class=\"wp-block-gutenbee-imagebox block-a3897f-1a3b-41 wp-block-gutenbee-imagebox-align-center\"><style>.wp-block-gutenbee-imagebox.block-a3897f-1a3b-41 .wp-block-gutenbee-imagebox-figure img { width: 710px; }<\/style><figure class=\"wp-block-gutenbee-imagebox-figure\"><img decoding=\"async\" src=\"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png\" alt=\"\"\/><\/figure><div class=\"wp-block-gutenbee-imagebox-content\"><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"how_does_a_ddos_attack_work\"><\/span>How does a DDoS attack work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>These attacks are carried out by compromised machines. Once compromised, this device will be referred to as a bot or a zombie. Groups of these machines are called botnets. The botnets are comprised of hundreds of internet-able devices. These devices have malware that allow them to be remotely controlled by an individual. <\/p>\n\n\n\n<p>An active botnet can be used to direct attacks by sending remote instructions to the each compromised machine.<\/p>\n\n\n\n<p>When your server gets targeted, each compromised machine sends a form of malicious traffic towards your network address. This could end up overwhelming your server or network which results in denying normal traffic, i.e denial of service.<\/p>\n\n\n\n<p>The unfortunate downside to this is because each compromised device is a real legitimate device, it&#8217;s hard to differentiate the attacking traffic from normal traffic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"am_i_protected_from_ddos_attacks\"><\/span>Am I protected from DDoS attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you&#8217;ve received an email from KnownHost regarding a DDoS event, do not worry!<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.knownhost.com\/\">KnownHost<\/a><\/strong>&nbsp;offers DDoS protection for all services. For more details on this protection please visit&nbsp;<strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\">KnownHost DDoS Protection<\/a><\/strong>. <\/p>\n\n\n\n<p>As such, should you experience a DDoS against a service with us, our automatic filtering will kick in and mitigate the attack allowing your server to continue to operate as it was intended. We simply send these notifications to inform you of the event and the actions that have been taken.<\/p>\n\n\n\n<p>Unfortunately, we do not filter Layer 7 traffic. If you want Layer 7 traffic protection, check out our <a href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-website-application-firewall\/\">Website Application Firewall<\/a> article.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"what_do_i_do_if_i_receive_a_ddos_attack\"><\/span>What do I do if I receive a DDoS attack?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you&#8217;re experiencing a situation where you feel that you&#8217;ve become victim of a DDoS attack, very few actions can be taken during the attack. Please open a&nbsp;<strong><a href=\"https:\/\/support.knownhost.com\/Tickets\/Submit\">Support Ticket<\/a><\/strong>&nbsp;for assistance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"how_do_i_protect_myself\"><\/span>How do I protect myself?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you&#8217;re using a KnownHost service, we provide majority of the protection for you with the exception of Layer 7 as previously outlined earlier in this article. <\/p>\n\n\n\n<p>To take extra steps to protect yourself, you can use services such as Imunify360 or a proxy service such as CloudFlare that sits infront of your website to filter traffic prior to reaching your server.<\/p>\n\n\n\n<p>Services such as CloudFlare acts as a middle-man to determine whether or not your &#8220;visit&#8221; should be served the content.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are two types of denial of service events. You have your denial of service(DoS) event and then your distributed denial of service event(DDoS). The difference between these two is how many connections are utilized during the attack. A DoS will use a single connection to hit a website, an example being &#8220;Slow Loris&#8221;. DDoS [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[266,123,502,131,501],"class_list":["post-439","post","type-post","status-publish","format-standard","hentry","category-technical-support","tag-ddos","tag-linux","tag-networking","tag-security","tag-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost<\/title>\n<meta name=\"description\" content=\"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost\" \/>\n<meta property=\"og:description\" content=\"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T12:27:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T12:35:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png\" \/>\n<meta name=\"author\" content=\"Jonathan K. W.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan K. W.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/\"},\"author\":{\"name\":\"Jonathan K. W.\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"headline\":\"What is a distributed denial of service (DDoS) &#038; How to prevent it?\",\"datePublished\":\"2021-06-30T12:27:51+00:00\",\"dateModified\":\"2026-01-23T12:35:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/\"},\"wordCount\":481,\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ddos-example.png\",\"keywords\":[\"ddos\",\"linux\",\"networking\",\"security\",\"server\"],\"articleSection\":[\"Technical Support\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/\",\"name\":\"What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ddos-example.png\",\"datePublished\":\"2021-06-30T12:27:51+00:00\",\"dateModified\":\"2026-01-23T12:35:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"description\":\"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ddos-example.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/ddos-example.png\",\"width\":700,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/what-is-a-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a distributed denial of service (DDoS) &#038; How to prevent it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\",\"name\":\"KnownHost\",\"description\":\"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\",\"name\":\"Jonathan K. W.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"caption\":\"Jonathan K. W.\"},\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost","description":"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/","og_locale":"en_US","og_type":"article","og_title":"What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost","og_description":"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.","og_url":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/","og_site_name":"KnownHost","article_published_time":"2021-06-30T12:27:51+00:00","article_modified_time":"2026-01-23T12:35:29+00:00","og_image":[{"url":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png","type":"","width":"","height":""}],"author":"Jonathan K. W.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan K. W.","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/"},"author":{"name":"Jonathan K. W.","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"headline":"What is a distributed denial of service (DDoS) &#038; How to prevent it?","datePublished":"2021-06-30T12:27:51+00:00","dateModified":"2026-01-23T12:35:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/"},"wordCount":481,"image":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png","keywords":["ddos","linux","networking","security","server"],"articleSection":["Technical Support"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/","url":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/","name":"What is DDoS? Understanding and Preventing DDoS Attacks | KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png","datePublished":"2021-06-30T12:27:51+00:00","dateModified":"2026-01-23T12:35:29+00:00","author":{"@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"description":"Experiencing some issues with DDoS? Learn what it is and how to protect yourself with our quick breakdown article.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#primaryimage","url":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png","contentUrl":"https:\/\/www.knownhost.com\/kb\/wp-content\/uploads\/2021\/11\/ddos-example.png","width":700,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/kb\/what-is-a-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/kb\/"},{"@type":"ListItem","position":2,"name":"What is a distributed denial of service (DDoS) &#038; How to prevent it?"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/kb\/#website","url":"https:\/\/www.knownhost.com\/kb\/","name":"KnownHost","description":"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b","name":"Jonathan K. W.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","caption":"Jonathan K. W."},"sameAs":["https:\/\/www.knownhost.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/comments?post=439"}],"version-history":[{"count":1,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/439\/revisions"}],"predecessor-version":[{"id":8037,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/439\/revisions\/8037"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/media?parent=439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/categories?post=439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/tags?post=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}