{"id":2346,"date":"2015-10-13T21:21:35","date_gmt":"2015-10-13T21:21:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2346"},"modified":"2020-05-06T10:30:09","modified_gmt":"2020-05-06T17:30:09","slug":"how-dangerous-can-an-open-dns-resolver-be-part-ii","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/","title":{"rendered":"How Dangerous Can An Open DNS Resolver Be? Part II"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2317\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/DNS-resolver.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p><em>The beginning of the article you can read in\u00a0<a href=\"\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part I<\/a>.<\/em><\/p>\n<p><strong>Types of attacks<\/strong><\/p>\n<p>These DNS attacks and DNS misuse have been identified with an open recursive servers:<\/p>\n<ul>\n<li>Cache Poisoning, Man-in-the-Middle<\/li>\n<li>DNS Amplification<\/li>\n<li>DNS Reflection<\/li>\n<li>Distributed reflection DoS (DrDoS)<\/li>\n<li>DNS-based exploits<\/li>\n<li>Protocol anomalies<\/li>\n<li>DNS tunneling<\/li>\n<li>DNS hijacking<\/li>\n<li>NXDOMAIN<\/li>\n<li>Phantom domain\/Random subdomain<\/li>\n<\/ul>\n<p><strong>Some math<\/strong><\/p>\n<p>I assume that any broadband router can handle up to 1000 QPS (I checked it on my Linksys router) with amplification attack and much more without amplification. Each desktop or laptop can generate thousands of DNS queries per second.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2349\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Open_Resolver_P3.png\" alt=\"\" width=\"599\" height=\"182\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P3.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P3-300x91.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>For attackers it is not necessary to create a special DNS zone because a lot of zones are signed (DNSSEC) and attackers can chose any of them. For example:<\/p>\n<ul>\n<li>org (a consortium which produce bind) had 4k response;<\/li>\n<li>gov has 4992 bytes in response.<\/li>\n<\/ul>\n<p>And the DNS request will be just about 70 bytes. For example for energystar.gov the amplification will be 4994\/74=<strong>67.5<\/strong>\u00a0times.<\/p>\n<p>Here some calculations of amplification attack using open resolvers and\/or botnets:<\/p>\n<ul>\n<li>\u00a0\u00a0\u00a0\u00a0Just utilizing broadband routers, which I found in the network of my Internet provider, a bad guy can generate\u00a0<strong>56Gb\/s<\/strong>\u00a0(69 routers * 4992 bytes * 1000 QPS) traffic utilizing only\u00a0<strong>0,56Mb\/s\u00a0<\/strong>inbound traffic per router or\u00a0<strong>38,95Mb\/s<\/strong>\u00a0per network;<\/li>\n<li>Now almost every broadband internet user in Moscow has 10Mb\/s an Internet connection, so:\n<ul>\n<li>His computer can easily generate about 18k QPS to energystar.gov (10Mbps\/74B) which can be sent to any DNS server;<\/li>\n<li>The DNS server will generate\u00a0<strong>685,5 Mb\/s\u00a0<\/strong>(18kQPS*4992b) outbound traffic;<\/li>\n<li><strong>15<\/strong>\u00a0infected computers and unprotected powerful DNS server can generate\u00a0<strong>10 Gb\/s<\/strong>\u00a0traffic, which can overload a network connection.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>All these open DNS resolvers can be used for DNS based slow drip DDOS attack.<\/p>\n<p>So you can see that DNS can be easily utilized for attacks and can be dangerous.<\/p>\n<p><strong>Description of the testing environment<\/strong><\/p>\n<p>My DNS server is located in Germany, has stable 1Gb\/s Ethernet connection and for the last 4 years it served authoritative DNS. One month before the study I migrated my server to a new platform, so the IP-addresses were changed. In authoritative mode it received no more than 2 queries per second (QPS) and in average less than 0.5.<\/p>\n<p>I used Infoblox Trinzic v820 as a DNS server, Infoblox Trinzic Reporting v800-1G for standard reports and my own reporting system (written by myself) for the deep data analysis. Domains, which were used for attacks, were blocked on a DNS Firewall. Maximum QPS rate was limited after 5 months.<\/p>\n<p><strong>Objectives<\/strong><\/p>\n<p>I defined several questions, which should be answered during the study:<\/p>\n<ul>\n<li>How fast will my DNS server\u00a0receive the first recursive query?<\/li>\n<li>How fast will it receive inappropriate requests?<\/li>\n<li>Measure medium and maximum QPS under an attack<\/li>\n<li>Find victims<\/li>\n<li>Try to find infected networks<\/li>\n<li>Find out domains and requests which are used for attacks<\/li>\n<li>Try to identify types of the attacks<\/li>\n<li>How long will my server be used when I turn off my open resolver<\/li>\n<\/ul>\n<p class=\"p1\"><a href=\"\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/\" target=\"_self\" rel=\"noopener noreferrer\">Continue reading in Part III<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The beginning of the article you can read in\u00a0Part I. Types of attacks These DNS attacks and DNS misuse have been identified with an open recursive servers: Cache Poisoning, Man-in-the-Middle DNS Amplification DNS Reflection Distributed reflection DoS (DrDoS) DNS-based exploits Protocol anomalies DNS tunneling DNS hijacking NXDOMAIN Phantom domain\/Random subdomain Some math I assume that [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,30,16,32,15],"class_list":{"0":"post-2346","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-dns","10":"tag-infoblox","11":"tag-malware","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Dangerous Can An Open DNS Resolver Be? Part II<\/title>\n<meta name=\"description\" content=\"These DNS attacks and DNS misuse have been identified with an open recursive servers:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Dangerous Can An Open DNS Resolver Be? Part II\" \/>\n<meta property=\"og:description\" content=\"These DNS attacks and DNS misuse have been identified with an open recursive servers:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-13T21:21:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vadim Pavlov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vadim Pavlov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/\"},\"author\":{\"name\":\"Vadim Pavlov\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\"},\"headline\":\"How Dangerous Can An Open DNS Resolver Be? Part II\",\"datePublished\":\"2015-10-13T21:21:35+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/\"},\"wordCount\":503,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"keywords\":[\"DDI\",\"DNS\",\"Infoblox\",\"Malware\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/\",\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part II\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"datePublished\":\"2015-10-13T21:21:35+00:00\",\"dateModified\":\"2020-05-06T17:30:09+00:00\",\"description\":\"These DNS attacks and DNS misuse have been identified with an open recursive servers:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-ii\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part II\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\",\"name\":\"Vadim Pavlov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"caption\":\"Vadim Pavlov\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/vadim-pavlov\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Dangerous Can An Open DNS Resolver Be? Part II","description":"These DNS attacks and DNS misuse have been identified with an open recursive servers:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/","og_locale":"en_US","og_type":"article","og_title":"How Dangerous Can An Open DNS Resolver Be? Part II","og_description":"These DNS attacks and DNS misuse have been identified with an open recursive servers:","og_url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-13T21:21:35+00:00","article_modified_time":"2020-05-06T17:30:09+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","type":"image\/jpeg"}],"author":"Vadim Pavlov","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vadim Pavlov","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/"},"author":{"name":"Vadim Pavlov","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974"},"headline":"How Dangerous Can An Open DNS Resolver Be? Part II","datePublished":"2015-10-13T21:21:35+00:00","dateModified":"2020-05-06T17:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/"},"wordCount":503,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","keywords":["DDI","DNS","Infoblox","Malware","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/","url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/","name":"How Dangerous Can An Open DNS Resolver Be? Part II","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","datePublished":"2015-10-13T21:21:35+00:00","dateModified":"2020-05-06T17:30:09+00:00","description":"These DNS attacks and DNS misuse have been identified with an open recursive servers:","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"How Dangerous Can An Open DNS Resolver Be? Part II"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974","name":"Vadim Pavlov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","caption":"Vadim Pavlov"},"url":"https:\/\/www.infoblox.com\/blog\/author\/vadim-pavlov\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2346"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2346\/revisions"}],"predecessor-version":[{"id":3755,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2346\/revisions\/3755"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}