{"id":2411,"date":"2015-10-01T22:01:19","date_gmt":"2015-10-01T22:01:19","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2411"},"modified":"2020-06-02T08:24:33","modified_gmt":"2020-06-02T15:24:33","slug":"understanding-nxdomain-attack-methods","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/","title":{"rendered":"Understanding NXDOMAIN Attack Methods"},"content":{"rendered":"<figure id=\"attachment_2372\" aria-describedby=\"caption-attachment-2372\" style=\"width: 725px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2372\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/typing-keyboard.jpg\" alt=\"\" width=\"725\" height=\"483\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg 725w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard-300x200.jpg 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><figcaption id=\"caption-attachment-2372\" class=\"wp-caption-text\">Computer crime concept<\/figcaption><\/figure>\n<p>Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception. A few years ago, we would see simple methods where attackers would send a flood of queries to a DNS server to resolve a non-existent domain name. They would repeatedly send the fake request again and again, hoping to slow down the DNS server\u2019s response time for legitimate requests. With newer technology and improvements in caching, these methods are often failing to cause the damage attackers hope for. So attackers are changing tactics.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2413\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/NXDOMAIN-Attack.png\" alt=\"\" width=\"814\" height=\"492\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NXDOMAIN-Attack.png 814w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NXDOMAIN-Attack-300x181.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NXDOMAIN-Attack-768x464.png 768w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><\/p>\n<p>Infoblox is now seeing many more sophisticated NXDOMAIN attacks using phantom domains and name servers that are set up as part of the attack. They also prepend randomly generated subdomain strings to DNS requests, which again means they are purposefully sending requests for subdomains that don\u2019t exist. The volume and type of attack might vary slightly based on what the attacker\u2019s intended target is \u2013 which can be either the recursive DNS server or the authoritative server of a target domain.<\/p>\n<p>When the target is the recursive server, the goal is to consume available resources of the server and pollute the cache with NXDOMAIN results. When the target is the authoritative server of another legitimate domain, it causes DDoS and can impact performance, especially for servers that have inadequate memory resources or have to query the disk to look up these non-existent domain names.<\/p>\n<p>There are ways to mitigate these complex NXDOMAIN attack methods and allow for continuous DNS service, even under attack. These include:<\/p>\n<ul>\n<li>Intelligently preventing NXDOMAIN responses from pushing out valid cache entries (cache pollution).<\/li>\n<li>Identifying misbehaving domains\/servers in real-time.<\/li>\n<li>Looking at behavior of clients that generate too many NXDOMAIN, NXRRset, or SRVFAIL responses.<\/li>\n<\/ul>\n<p>To learn more about the attack methods and the new ways Infoblox can protect against NXDOMAIN attacks, read the new Infoblox Solution Note\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/resources\/solution-notes\/nxdomain-attack-methods-and-mitigation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception. A few years ago, we would see simple methods where attackers would send a flood of queries to a DNS server to resolve a non-existent domain name. They would repeatedly send the fake request [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":2372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,15,48],"class_list":{"0":"post-2411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-security","10":"tag-threat","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding NXDOMAIN Attack Methods<\/title>\n<meta name=\"description\" content=\"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding NXDOMAIN Attack Methods\" \/>\n<meta property=\"og:description\" content=\"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-01T22:01:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-02T15:24:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Understanding NXDOMAIN Attack Methods\",\"datePublished\":\"2015-10-01T22:01:19+00:00\",\"dateModified\":\"2020-06-02T15:24:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"keywords\":[\"DNS\",\"Security\",\"Threat\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/\",\"name\":\"Understanding NXDOMAIN Attack Methods\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"datePublished\":\"2015-10-01T22:01:19+00:00\",\"dateModified\":\"2020-06-02T15:24:33+00:00\",\"description\":\"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"width\":725,\"height\":483,\"caption\":\"Computer crime concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/understanding-nxdomain-attack-methods\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Understanding NXDOMAIN Attack Methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding NXDOMAIN Attack Methods","description":"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/","og_locale":"en_US","og_type":"article","og_title":"Understanding NXDOMAIN Attack Methods","og_description":"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-01T22:01:19+00:00","article_modified_time":"2020-06-02T15:24:33+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Understanding NXDOMAIN Attack Methods","datePublished":"2015-10-01T22:01:19+00:00","dateModified":"2020-06-02T15:24:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","keywords":["DNS","Security","Threat"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/","url":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/","name":"Understanding NXDOMAIN Attack Methods","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","datePublished":"2015-10-01T22:01:19+00:00","dateModified":"2020-06-02T15:24:33+00:00","description":"Distributed denial of service (DDoS) attacks exploiting the Domain Name System (DNS) are constantly evolving and NXDOMAIN attacks are no exception.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","width":725,"height":483,"caption":"Computer crime concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/understanding-nxdomain-attack-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Understanding NXDOMAIN Attack Methods"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2411"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2411\/revisions"}],"predecessor-version":[{"id":5252,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2411\/revisions\/5252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2372"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}