{"id":729,"date":"2020-09-19T14:07:01","date_gmt":"2020-09-19T19:07:01","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=729"},"modified":"2020-09-19T14:07:04","modified_gmt":"2020-09-19T19:07:04","slug":"what-are-the-most-common-ddos-attacks","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/","title":{"rendered":"What are the most common DDoS attacks"},"content":{"rendered":"\n<p>Distributed Denial of Service (DDoS) attacks are becoming increasingly common in the business environment. Today, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of downtime, while damaging brands, costing companies millions in lost revenue. That is why it is important to fully understand these and what causes these attacks to be able to take action against such attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS.png\" alt=\"\" class=\"wp-image-730\" width=\"538\" height=\"268\" srcset=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS.png 796w, https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-300x150.png 300w, https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-768x383.png 768w\" sizes=\"auto, (max-width: 538px) 100vw, 538px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Types of DDoS attacks<\/h2>\n\n\n\n<p><strong><em>\u25b8Syn flood<\/em><\/strong><\/p>\n\n\n\n<p>This type of attack occurs when a person or program manages to impersonate another successfully, falsifying data (spoof) and flooding the server connection table with SYN packets, bombarding them until they actually bring them down. The good news is that the low volume of SYN flood attacks can be easily stopped by firewall software. High bandwidth SYN flood attacks, however, require specialized equipment with SYN proxy capabilities.<\/p>\n\n\n\n<p><strong><em>\u25b8ICMP Flood<\/em><\/strong><\/p>\n\n\n\n<p>This attack occurs as a result of ICMP packets that overload the servers to such an extent that it causes a system failure. Low volume ICMP flood attacks can be easily stopped with Access Control Lists (ACLs) on routers and switches. Like other high-bandwidth attacks, high-bandwidth ICMP floods require specialized equipment.<\/p>\n\n\n\n<p><strong><em>\u25b8Service Port Flood<\/em><\/strong><\/p>\n\n\n\n<p>In these types of attacks, packets bombard the ports in service that already enable heavy traffic (such as TCP port 80) to and from the organization&#8217;s network. These types of attacks are among the most treacherous due to the fact that they cannot be stopped or slowed by many of the standard security and network solutions &#8211; including firewalls, switches, IPS devices, and routers. To block these threats, organizations will need to invest in more sophisticated security technologies.<\/p>\n\n\n\n<p><strong><em>\u25b8HTTP GET Flood <\/em><\/strong><\/p>\n\n\n\n<p>This type of attack results from connection-oriented bots that flood servers, affecting network traffic on service ports such as HTTP, while posing as legitimate users. Firewalls, switches, and routers won&#8217;t stop them either. To do this, the victim organization will have to reinforce its security structure with more resistant solutions.<\/p>\n\n\n\n<p><strong><em>\u25b8Anomalous Packet Flood<\/em><\/strong><\/p>\n\n\n\n<p>In such an attack, packets with abnormal headers or status overload servers and choke the network. However, organizations can take advantage of some firewalls and IPS devices to stop these attacks. To that end, solutions designed to detect and protect networks from DDoS attacks can easily stop these types of attacks.<\/p>\n\n\n\n<p><strong><em>\u25b8Zombie Flood<\/em><\/strong><\/p>\n\n\n\n<p>This attack occurs when connections that have not been spoofed overload services, causing paralysis in the network. Unlike SYN flood attacks, Zombie flood attacks are more difficult to stop unless the attacked victim has some form of behavioral mitigation technology. Even more difficult to control are high-bandwidth zombie floods, which require specialized logic for legitimate connections and range limits.<\/p>\n\n\n\n<p><strong><em>\u25b8Flooding of a Foreign Region<\/em><\/strong><\/p>\n\n\n\n<p>This occurs when bots from a specific geographic region attack the servers of the victim organization. These types of attacks are usually generated through very comprehensive targeted campaigns, and as such are usually more difficult to suppress. Among other things, security equipment designed to combat these attacks will need to contain visibility technologies with the ability to automatically detect irregular or anomalous patterns of behavior.<\/p>\n\n\n\n<p><strong><em>\u25b8Non-service Port Flood<\/em><\/strong><\/p>\n\n\n\n<p>In this attack, TCP \/ UDP packets bombard servers, increasing the flow of traffic on unused servers. Organizations can easily combat these types of attacks with ACLs, but more powerful attacks require stronger security solutions.<\/p>\n\n\n\n<p>Of course there are many other types of DDoS attacks, but these could be considered the most common and due to technological advance, extreme care must be taken since technology is not the only thing that advances.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service (DDoS) attacks are becoming increasingly common in the business environment. Today, powerful DDoS attacks have the ability to shut down dozens of servers, causing hours of downtime, while damaging brands, costing companies millions in lost revenue. That is why it is important to fully understand these and what causes these attacks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":731,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,11],"tags":[36,100],"class_list":["post-729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-ddos","tag-cybersecurity","tag-ddos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the most common DDoS attacks - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the most common DDoS attacks - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-19T19:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-19T19:07:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"355\" \/>\n\t<meta property=\"og:image:height\" content=\"142\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"What are the most common DDoS attacks\",\"datePublished\":\"2020-09-19T19:07:01+00:00\",\"dateModified\":\"2020-09-19T19:07:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/\"},\"wordCount\":591,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/DDoS-attacks.jpg\",\"keywords\":[\"Cybersecurity\",\"DDOS\"],\"articleSection\":[\"Cybersecurity\",\"DDOS\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/\",\"name\":\"What are the most common DDoS attacks - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/DDoS-attacks.jpg\",\"datePublished\":\"2020-09-19T19:07:01+00:00\",\"dateModified\":\"2020-09-19T19:07:04+00:00\",\"description\":\"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/DDoS-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/DDoS-attacks.jpg\",\"width\":355,\"height\":142},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/what-are-the-most-common-ddos-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the most common DDoS attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the most common DDoS attacks - Truxgo Server Blog","description":"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/","og_locale":"es_MX","og_type":"article","og_title":"What are the most common DDoS attacks - Truxgo Server Blog","og_description":"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...","og_url":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/","og_site_name":"Truxgo Server Blog","article_published_time":"2020-09-19T19:07:01+00:00","article_modified_time":"2020-09-19T19:07:04+00:00","og_image":[{"width":355,"height":142,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"What are the most common DDoS attacks","datePublished":"2020-09-19T19:07:01+00:00","dateModified":"2020-09-19T19:07:04+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/"},"wordCount":591,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg","keywords":["Cybersecurity","DDOS"],"articleSection":["Cybersecurity","DDOS"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/","url":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/","name":"What are the most common DDoS attacks - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg","datePublished":"2020-09-19T19:07:01+00:00","dateModified":"2020-09-19T19:07:04+00:00","description":"Like other types of viruses there are many DDoS And that is why we must know them thoroughly to prevent ourselves from such attacks...","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/09\/DDoS-attacks.jpg","width":355,"height":142},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/what-are-the-most-common-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are the most common DDoS attacks"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=729"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/729\/revisions"}],"predecessor-version":[{"id":746,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/729\/revisions\/746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/731"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}