{"id":2964,"date":"2016-03-23T20:48:30","date_gmt":"2016-03-23T20:48:30","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2964"},"modified":"2020-05-06T10:30:03","modified_gmt":"2020-05-06T17:30:03","slug":"the-malicious-domain-is-in-your-own-house","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/","title":{"rendered":"The Malicious Domain is in your own House!"},"content":{"rendered":"<p>Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting. Much the same story is playing out on the Internet today, with malicious domains and DNS infrastructure used by criminals located in the same place as the victims.<\/p>\n<p>While common sense and media coverage may lead you to believe that most of the world\u2019s malicious domains and hostnames are hosted in cybercrime hotspots such as Eastern Europe, Southeast Asia or Africa, that couldn\u2019t be further from the truth. Infoblox\u2019s analysis shows the underlying Domain Name System (DNS) infrastructure used to launch the majority of the latest waves of cyberattacks actually sits in the backyard of the world\u2019s top economies \u2013 most notably in the United States.<\/p>\n<p>In the\u00a0<a href=\"http:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox DNS Threat Index<\/a>\u00a0report for the fourth quarter of 2015, released today, our researchers found that 92 percent of newly observed malicious DNS infrastructure in the quarter was hosted in either the U.S. at 72 percent or Germany at 19 percent. No other country registered above 2 percent.<\/p>\n<p>It is important to note that where a malicious domain or hostname is hosted is not an indication of \u201cwhere the bad guys are.\u201d Exploit kits and other malware can be developed in one country, sold in another, and used in a third to launch attacks through systems hosted in a fourth \u2013 which is part of what makes stamping out cybercrime so difficult.<\/p>\n<p>However, such a list can be an indication of which countries and service providers tend to have lax regulations, monitoring, prevention, or resources dedicated to mitigating threats, or all of the above. Identification of those countries and service providers helps shine a light on needed improvements.<\/p>\n<p>Several observations can be drawn from the fact that infrastructure used to launch attacks sits safely and comfortably in some of the most developed countries.<\/p>\n<p>First, location does not denote protection; just because a domain is hosted in the U.S. or Germany does not make it safe as one might assume.<\/p>\n<p>Secondly, criminals are just as likely to take advantage of the robust technology and service infrastructure that exists in these countries as is any legitimate business, and it would be difficult to harden that infrastructure against exploit without limiting much of the speed and responsiveness that makes it attractive for business.<\/p>\n<p>Third, the growing use of malicious hostnames configured under legitimate domain names where management accounts have been compromised shows how various criminal enterprises are teaming up to create even more criminal infrastructure. Such hostnames borrow off the good reputation of a long-standing domain name, and cannot be blocked at the domain level without creating collateral damage. This makes mitigation efforts that much harder, and the need for accurate intelligence even more keen for network defenders.<\/p>\n<p>It would be nice to think that, at the very least, hosting providers would be quick to take down a malicious domain once it is identified, thus limiting the damage. After all, providers in the U.S. don\u2019t face the same language barriers, cross-border jurisdiction issues, policy differences, etc., that confront an international policing and take-down effort. Unfortunately, the U.S. has hosting providers \u2013 large and small \u2013 who are very slow to respond often because they are overwhelmed with complaints and work. If there is an area of focus for improvement, this is it.<\/p>\n<p>These findings are one of many eye-opening stats we uncovered in the Infoblox DNS Threat Index. The index tracks the creation of malicious DNS infrastructure, through both registration of new domains and hijacking of previously legitimate domains or hosts. This quarter, the index rose by 49 percent from Q4 2014 to Q4 2015, meaning the number of malicious domains significantly increased year to year. To read the entire report, go to\u00a0<a href=\"https:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">infoblox.com\/dns-threat-index<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting. Much the same story is playing out on the Internet today, with malicious domains and DNS infrastructure used [&hellip;]<\/p>\n","protected":false},"author":255,"featured_media":2894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,16,15,111],"class_list":{"0":"post-2964","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"tag-threat-index","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Malicious Domain is in your own House!<\/title>\n<meta name=\"description\" content=\"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Malicious Domain is in your own House!\" \/>\n<meta property=\"og:description\" content=\"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-23T20:48:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rod Rasmussen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rod Rasmussen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/\"},\"author\":{\"name\":\"Rod Rasmussen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/25e512cd48aba00880cc102b5a76066a\"},\"headline\":\"The Malicious Domain is in your own House!\",\"datePublished\":\"2016-03-23T20:48:30+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\",\"Threat Index\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/\",\"name\":\"The Malicious Domain is in your own House!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"datePublished\":\"2016-03-23T20:48:30+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"description\":\"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Spooks-and-Spys.jpg\",\"width\":660,\"height\":454,\"caption\":\"Spook's and Spy's\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/the-malicious-domain-is-in-your-own-house\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Malicious Domain is in your own House!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/25e512cd48aba00880cc102b5a76066a\",\"name\":\"Rod Rasmussen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g\",\"caption\":\"Rod Rasmussen\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/rod-rasmussen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Malicious Domain is in your own House!","description":"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/","og_locale":"en_US","og_type":"article","og_title":"The Malicious Domain is in your own House!","og_description":"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/","og_site_name":"Infoblox Blog","article_published_time":"2016-03-23T20:48:30+00:00","article_modified_time":"2020-05-06T17:30:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","type":"image\/jpeg"}],"author":"Rod Rasmussen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rod Rasmussen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/"},"author":{"name":"Rod Rasmussen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/25e512cd48aba00880cc102b5a76066a"},"headline":"The Malicious Domain is in your own House!","datePublished":"2016-03-23T20:48:30+00:00","dateModified":"2020-05-06T17:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/"},"wordCount":657,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","keywords":["DNS","Infoblox","Security","Threat Index"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/","url":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/","name":"The Malicious Domain is in your own House!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","datePublished":"2016-03-23T20:48:30+00:00","dateModified":"2020-05-06T17:30:03+00:00","description":"Anyone who\u2019s seen the movie \u201cWhen a Stranger Calls\u201d remembers the chilling scene when the police call Jill to tell her they\u2019ve traced the threatening calls she has been receiving to the very house where she\u2019s babysitting.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Spooks-and-Spys.jpg","width":660,"height":454,"caption":"Spook's and Spy's"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/the-malicious-domain-is-in-your-own-house\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"The Malicious Domain is in your own House!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/25e512cd48aba00880cc102b5a76066a","name":"Rod Rasmussen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47374f454c2d156ce205482393d204b52a12daf848e33c5521f04e5ba4fd7cb3?s=96&d=blank&r=g","caption":"Rod Rasmussen"},"url":"https:\/\/www.infoblox.com\/blog\/author\/rod-rasmussen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/255"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2964"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2964\/revisions"}],"predecessor-version":[{"id":2965,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2964\/revisions\/2965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}