{"id":2356,"date":"2015-10-12T21:29:07","date_gmt":"2015-10-12T21:29:07","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2356"},"modified":"2022-10-21T13:37:45","modified_gmt":"2022-10-21T20:37:45","slug":"how-dangerous-can-an-open-dns-resolver-be-part-i","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/","title":{"rendered":"How Dangerous Can An Open DNS Resolver Be? Part I"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2361 alignnone\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Open_Resolver_P1.png\" alt=\"\" width=\"600\" height=\"301\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P1.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P1-300x151.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Almost every IT professional knows that an open recursive DNS server can be very dangerous but I\u2019ve never seen any articles or posts which describe what will happen and how fast it may be utilized in an inappropriate way. These were interesting questions for me and I decided to do a small study and opened my DNS server for everybody on the Internet. The results were amazing. In this post you can read about the study.<\/p>\n<p><strong>A short overview of the DNS protocol and DNS based attacks.<\/strong><\/p>\n<p>DNS (Domain Name System) is used for transforming human readable domain names (e.g. ipvm.biz) into the machine usable form of IP-addresses (e.g. 1.2.3.4). IP addresses are used for communications in Internet. Other protocols like TCP or UDP run on top of the IP protocol. TCP\/IP is a stateful protocol and UDP\/IP is a stateless protocol.<\/p>\n<p>Attackers use such basic principles for DNS based attacks:<\/p>\n<ul>\n<li>During a standard DNS resolving process UDP\/IP protocol is used. Computers do not establish reliable (stateful) connection with a remote DNS server. They send a request and just wait some time for a response. Because UDP protocol is stateless hackers can spoof an IP-address in the IP packet. It is a good practice for ISPs to block such spoofed packets but unfortunately many ISPs do not follow it.<\/li>\n<li>The size of a response packet from DNS server usually is bigger than the size of a request. Protocol EDNS was developed to support big packet sizes up to 4Kb. EDNS is necessary for DNSSEC. This principle is used for amplification attack.<\/li>\n<li>Many network devices like improperly configured or hacked servers, home modems and routers provide recursive DNS services in local networks or on the Internet. Studies show that daily about 6 million open resolvers are available and accessible on the Internet all around the world. The table and the picture below were taken from\u00a0<a href=\"https:\/\/dnsscan.shadowserver.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/dnsscan.shadowserver.org\/<\/a>\u00a0site which daily checks networks for open resolvers.<\/li>\n<\/ul>\n<table width=\"547\">\n<thead>\n<tr>\n<td><strong>Country<\/strong><\/td>\n<td><strong>Total<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>China<\/td>\n<td>1,923,492<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>463,806<\/td>\n<\/tr>\n<tr>\n<td>Korea, Republic of<\/td>\n<td>451,709<\/td>\n<\/tr>\n<tr>\n<td>Taiwan<\/td>\n<td>353,953<\/td>\n<\/tr>\n<tr>\n<td>Brazil<\/td>\n<td>255,628<\/td>\n<\/tr>\n<tr>\n<td>Russian Federation<\/td>\n<td>221,039<\/td>\n<\/tr>\n<tr>\n<td>India<\/td>\n<td>216,398<\/td>\n<\/tr>\n<tr>\n<td>Turkey<\/td>\n<td>131,638<\/td>\n<\/tr>\n<tr>\n<td>Japan<\/td>\n<td>99,515<\/td>\n<\/tr>\n<tr>\n<td>Hong Kong<\/td>\n<td>73,615<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2363 aligncenter\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Open_Resolver_P2.jpg\" alt=\"\" width=\"599\" height=\"366\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P2.jpg 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P2-300x183.jpg 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>I\u2019ve personally checked one of my Internet provider\u2019s \/16 network (one of the major broadband ISPs in Moscow) and found 69 open recursive DNS servers, which were available on the Internet. Each such open DNS server could be a broadband router or a desktop\/laptop.<\/p>\n<p class=\"p1\"><a href=\"\/community\/how-dangerous-can-an-open-dns-resolver-be-part-ii\/\" target=\"_self\" rel=\"noopener noreferrer\">Continue reading in Part II<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every IT professional knows that an open recursive DNS server can be very dangerous but I\u2019ve never seen any articles or posts which describe what will happen and how fast it may be utilized in an inappropriate way. These were interesting questions for me and I decided to do a small study and opened [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,30,16,15],"class_list":{"0":"post-2356","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-dns","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Dangerous Can An Open DNS Resolver Be? Part I<\/title>\n<meta name=\"description\" content=\"Your company&#039;s network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Dangerous Can An Open DNS Resolver Be? Part I\" \/>\n<meta property=\"og:description\" content=\"Your company&#039;s network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-12T21:29:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-21T20:37:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vadim Pavlov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vadim Pavlov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/\"},\"author\":{\"name\":\"Vadim Pavlov\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\"},\"headline\":\"How Dangerous Can An Open DNS Resolver Be? Part I\",\"datePublished\":\"2015-10-12T21:29:07+00:00\",\"dateModified\":\"2022-10-21T20:37:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"keywords\":[\"DDI\",\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/\",\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part I\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"datePublished\":\"2015-10-12T21:29:07+00:00\",\"dateModified\":\"2022-10-21T20:37:45+00:00\",\"description\":\"Your company's network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-i\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part I\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\",\"name\":\"Vadim Pavlov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"caption\":\"Vadim Pavlov\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/vadim-pavlov\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Dangerous Can An Open DNS Resolver Be? Part I","description":"Your company's network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/","og_locale":"en_US","og_type":"article","og_title":"How Dangerous Can An Open DNS Resolver Be? Part I","og_description":"Your company's network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-12T21:29:07+00:00","article_modified_time":"2022-10-21T20:37:45+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","type":"image\/jpeg"}],"author":"Vadim Pavlov","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vadim Pavlov","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/"},"author":{"name":"Vadim Pavlov","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974"},"headline":"How Dangerous Can An Open DNS Resolver Be? Part I","datePublished":"2015-10-12T21:29:07+00:00","dateModified":"2022-10-21T20:37:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/"},"wordCount":408,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","keywords":["DDI","DNS","Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/","url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/","name":"How Dangerous Can An Open DNS Resolver Be? Part I","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","datePublished":"2015-10-12T21:29:07+00:00","dateModified":"2022-10-21T20:37:45+00:00","description":"Your company's network security system may be vulnerable to DNS based attacks. Find out how dangerous these attacks can be and how to protect yourself here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"How Dangerous Can An Open DNS Resolver Be? Part I"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974","name":"Vadim Pavlov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","caption":"Vadim Pavlov"},"url":"https:\/\/www.infoblox.com\/blog\/author\/vadim-pavlov\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2356"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2356\/revisions"}],"predecessor-version":[{"id":8203,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2356\/revisions\/8203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}