{"id":2191,"date":"2015-11-17T19:05:47","date_gmt":"2015-11-17T19:05:47","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2191"},"modified":"2022-10-20T11:46:16","modified_gmt":"2022-10-20T18:46:16","slug":"moller-insights-port-53-the-unknown-security-threat","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/","title":{"rendered":"Moller Insights &#8211; Port 53  The Unknown Security Threat"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2194\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/info-protection.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p class=\"p1\">I recently started working at Infoblox and to be honest with you, it has been a crazy couple of weeks. For my return to blogging I would like to share with you what I have learned since joining Infoblox.<\/p>\n<p class=\"p1\">I learned about the security issues that surround the Domain Name System (DNS) and how easy it is to use port 53 \u2013 the networking port for DNS traffic \u2013 to attack organizations or steal information. I have worked in the security field for over 15 years, but really had no idea traditional security technology can\u2019t secure DNS traffic. So I thought I would warm up with sharing a few facts about DNS Security.<\/p>\n<p class=\"p1\">Cyberattacks on DNS servers represent one of the most significant threats to Internet security today, second only to HTTP.<\/p>\n<p class=\"p1\">As you all know, DNS works a bit like a phone book, translating a URL such as <a href=\"http:\/\/www.google.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span class=\"s1\">www.google.com<\/span><\/a>\u00a0into an IP address to guide the user to the right page. Because DNS is used by nearly all networked applications \u2013 including email, Web browsing, ecommerce, Internet telephony, the Internet of Things and more \u2013 these types of attacks threaten the very basis of modern communications and commerce.<\/p>\n<p class=\"p1\">Whether conducted for financial motives, political gain, or the notoriety of the hacker, the damage from a DNS attack can be devastating. That\u2019s something recent attack targets such as Telia, The New York Times, AT&amp;T and Bank of America might agree on.<\/p>\n<p class=\"p2\">In order to protect themselves from external and internal attacks, companies around the world are investing heavily in Internet security solutions. They believe this makes them safe. But what many CIOs and their likes don\u2019t realize is that traditional security measures typically don\u2019t enough protection against DNS attacks because they leave port 53 in the firewall open.<\/p>\n<p class=\"p2\">The reason most leave port 53 open and vulnerable is because they want to want to insure a good flow of traffic with no latency for maximum networking efficiency. But in reality, what many IT managers are doing is installing a state-of-the-art front door for while leaving the back window open.<\/p>\n<p class=\"p1\">Take the well-known attack on Target as an example. The U.S. retailer was subjected to a string of attacks that targeted their point-of-sale (POS) system. The malware was inside the system for six months exfiltrating data through DNS before anyone realized what was going on.<\/p>\n<p class=\"p1\">So how do you protect yourself from these attacks? One of the biggest challenges for IT organizations is the varied and ever-changing options for DNS attacks. Common attack types include distributed denial of service (DDoS), TCP SYN flood attacks, UDP flood attacks, Spoofed Source Address\/LAND attacks, Cache Poisoning attacks and Man in the Middle attacks.<\/p>\n<p class=\"p3\">Most companies deploying external name servers have chosen hardware running general-purpose operating systems as their platform. While this deployment may be inexpensive, general-purpose servers have several major risks that can increase the propagation of DNS attacks. Common shortcomings of the conventional approach include:<\/p>\n<p class=\"p4\"><span class=\"s2\">&#8211; <\/span>Many open ports are subject to attack<\/p>\n<p class=\"p4\"><span class=\"s2\">&#8211;<\/span> Users have OS-level account privileges on the server<\/p>\n<p class=\"p4\"><span class=\"s2\">&#8211;<\/span> Requires time-consuming manual updates<\/p>\n<p class=\"p4\"><span class=\"s2\">&#8211; <\/span>Requires multiple applications for device management<\/p>\n<p class=\"p4\"><span class=\"s2\">&#8211;<\/span> Inconsistent or outdated security procedures.<\/p>\n<p class=\"p1\">Instead of relying on general-purpose servers and hoping your internal IT team will\u00a0 never leave a hole in the system, organizations can leverage purpose-built appliances with intuitive interfaces and embedded expertise to improve DNS availability and reduce the risk of DNS attacks.<\/p>\n<p class=\"p1\">Don\u2019t leave the back window open \u2013 protect your DNS environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently started working at Infoblox and to be honest with you, it has been a crazy couple of weeks. For my return to blogging I would like to share with you what I have learned since joining Infoblox. I learned about the security issues that surround the Domain Name System (DNS) and how easy [&hellip;]<\/p>\n","protected":false},"author":197,"featured_media":2194,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15,36],"class_list":{"0":"post-2191","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Moller Insights - Port 53 The Unknown Security Threat<\/title>\n<meta name=\"description\" content=\"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Moller Insights - Port 53 The Unknown Security Threat\" \/>\n<meta property=\"og:description\" content=\"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-17T19:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T18:46:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fredrik Moller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fredrik Moller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/\"},\"author\":{\"name\":\"Fredrik Moller\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/abf6205b0d8780cb87056fed5ddfc965\"},\"headline\":\"Moller Insights &#8211; Port 53 The Unknown Security Threat\",\"datePublished\":\"2015-11-17T19:05:47+00:00\",\"dateModified\":\"2022-10-20T18:46:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/info-protection.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Threats\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/\",\"name\":\"Moller Insights - Port 53 The Unknown Security Threat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/info-protection.jpg\",\"datePublished\":\"2015-11-17T19:05:47+00:00\",\"dateModified\":\"2022-10-20T18:46:16+00:00\",\"description\":\"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/info-protection.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/info-protection.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-port-53-the-unknown-security-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Moller Insights &#8211; Port 53 The Unknown Security Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/abf6205b0d8780cb87056fed5ddfc965\",\"name\":\"Fredrik Moller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"caption\":\"Fredrik Moller\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/fredrik-moller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Moller Insights - Port 53 The Unknown Security Threat","description":"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/","og_locale":"en_US","og_type":"article","og_title":"Moller Insights - Port 53 The Unknown Security Threat","og_description":"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/","og_site_name":"Infoblox Blog","article_published_time":"2015-11-17T19:05:47+00:00","article_modified_time":"2022-10-20T18:46:16+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg","type":"image\/jpeg"}],"author":"Fredrik Moller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fredrik Moller","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/"},"author":{"name":"Fredrik Moller","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/abf6205b0d8780cb87056fed5ddfc965"},"headline":"Moller Insights &#8211; Port 53 The Unknown Security Threat","datePublished":"2015-11-17T19:05:47+00:00","dateModified":"2022-10-20T18:46:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg","keywords":["Infoblox","Security","Threats"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/","url":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/","name":"Moller Insights - Port 53 The Unknown Security Threat","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg","datePublished":"2015-11-17T19:05:47+00:00","dateModified":"2022-10-20T18:46:16+00:00","description":"Port 53 is able to be used to attack Domain Name Systems (DNS). Learn about the best protections against external and internal attacks for your company here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/info-protection.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-port-53-the-unknown-security-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Moller Insights &#8211; Port 53 The Unknown Security Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/abf6205b0d8780cb87056fed5ddfc965","name":"Fredrik Moller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","caption":"Fredrik Moller"},"url":"https:\/\/www.infoblox.com\/blog\/author\/fredrik-moller\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/197"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2191"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2191\/revisions"}],"predecessor-version":[{"id":8153,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2191\/revisions\/8153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2194"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}