{"id":63551,"date":"2020-08-30T10:00:36","date_gmt":"2020-08-30T10:00:36","guid":{"rendered":"https:\/\/rockcontent.com\/blog\/dns-hijacking\/"},"modified":"2025-09-09T16:09:51","modified_gmt":"2025-09-09T19:09:51","slug":"dns-hijacking","status":"publish","type":"post","link":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/","title":{"rendered":"What is DNS Hijacking and how to prevent it from happening on your website"},"content":{"rendered":"<p>Do you know how DNS hijacking can harm your brand?<\/p>\n<p>Cybercriminals are aware of how important the&nbsp;<strong>Domain Name System (DNS) is for Internet usability<\/strong>. It is responsible for turning numerical IP addresses into domain names, which can be easily saved and shared by people.<\/p>\n<p>Hackers also understand that this is a reliable protocol and that many organizations do not monitor their DNS traffic properly to <a href=\"https:\/\/pingback.com\/en\/resources\/website-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"prevent malicious attacks (opens in a new tab)\">prevent malicious attacks<\/a>.<\/p>\n<p>DNS Hijacking works by replacing the TCP\/IP configuration that redirects traffic to an unauthorized server under the attacker&#8217;s control.<\/p>\n<p>In this article, we discuss what DNS Hijacking is and how you, an Internet user, can protect your system from this kind of attack. See below:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"#what\">What is DNS Hijacking?<\/a><\/li>\n<li><a href=\"#purpose\">What is the cybercriminals&#8217; purpose?<\/a><\/li>\n<li><a href=\"#do\">Do only cybercriminals use DNS Hijacking?<\/a><\/li>\n<li><a href=\"#how\">How to prevent this type of attack on your website?<\/a><\/li>\n<\/ul>\n<p><a id=\"what\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>What is DNS Hijacking?<\/strong><\/h2>\n<p>DNS Hijacking is a form of DNS intrusion that&nbsp;<strong>occurs mainly through phishing attacks<\/strong>. However, the victim&#8217;s system can also be hacked on self-service platforms (through Internet service providers) and DNS providers based on public routers.<\/p>\n<p>In domestic infrastructures, DNS Hijacking<strong>&nbsp;takes advantage of the router firmware&#8217;s vulnerabilities<\/strong>, which allows access without a password request.<\/p>\n<p>It also depends on the negligence of users who&nbsp;<strong>keep devices&#8217; factory credentials unchanged<\/strong>, information that can be easily found by hackers for later access to the server.<\/p>\n<p>These intrusion methods&nbsp;<strong>direct web traffic to unauthorized DNS servers<\/strong>. Thus, users&#8217; requests are intercepted and the system is redirected to the attacker&#8217;s compromised DNS.<\/p>\n<p>The browser displays <a href=\"https:\/\/pingback.com\/en\/resources\/change-wordpress-url\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"the original URL (opens in a new tab)\">the original URL<\/a>, which leads the user to believe that the site is trusted for access. Meanwhile, the information shared on websites and stored in the database is stolen and all activities performed on the machine are monitored.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-opt-id=1598860985  data-opt-src=\"https:\/\/s3.amazonaws.com\/scribblelive-com-prod\/wp-content\/uploads\/sites\/4\/2020\/08\/fig1-dns-hijack.png\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-15600\"\/><figcaption> (Source: https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/images\/cyberpedia\/fig1-dns-hijack.png) <\/figcaption><\/figure>\n<\/div>\n<p><a id=\"purpose\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>What is the cybercriminals&#8217; purpose?<\/strong><\/h2>\n<p>The purpose of this type of attack, in addition to&nbsp;<strong>collecting personal and financial information<\/strong>, is to add unauthorized advertisements on the user&#8217;s page, turn them into audiences for websites with ads, or request a ransom for hijacked data, usually paid for in cryptocurrencies. This makes it difficult for the authorities to track the transaction.<\/p>\n<p>Phishing, for example, directs access to a fake version of the website. In the process, confidential information is stolen, which can be used&nbsp;<strong>in exchange for a ransom&nbsp;<\/strong>or so that&nbsp;<strong>the cybercriminal can assume the user&#8217;s identity&nbsp;<\/strong>in online transactions.<\/p>\n<p>Financial institutions are the main target of phishing attacks because the deceived user can input data such as their account number, username, and password on the fake page, without even realizing it.<\/p>\n<p>Consequently, the hacker takes over the account on the real page and carries out financial transactions.<\/p>\n<p>DNS Hijacking is not essential in phishing attacks, because they happen through the access of manipulated links. However,&nbsp;<strong>when the DNS is corrupted, a phishing attack can be even more critical<\/strong>.<\/p>\n<p>Regardless of whether the user entered the correct URL or clicked on a website from a widget, it will still be redirected to that fake website. Access is unlikely to arouse users&#8217; distrust and that is what makes DNS Hijacking even more malicious.<\/p>\n<p>In contrast,&nbsp;<strong>pharming attacks do not harm the user<\/strong>. They happen because the attacker takes advantage of the victim&#8217;s &#8220;digital identity&#8221; to turn them into an&nbsp;<strong>audience for websites with ads<\/strong>, who pay owners dearly for the clicks obtained in these environments.<\/p>\n<p>The scam directs users to a fake website, filled with advertisements. These web pages do not perform any real function, but the operator generates revenue each time they are visited \u2014 even if the person closes the page immediately after opening it.<\/p>\n<p>From the profit of these operations, the cybercriminal can finance other criminal activities.<\/p>\n<p><a id=\"do\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>Do only cybercriminals use DNS Hijacking?<\/strong><\/h2>\n<p>Unlike what most people think, DNS Hijacking is not just for Internet fraud practices. The&nbsp;<strong>intrusion system can also be used by other agents<\/strong>.<\/p>\n<p>Some governments, for example, apply the practice to censor the Internet: they repress political opposition or prohibit access to specific content, such as sites with illegal or pornographic content.<\/p>\n<p>That way, users who attempt to access this kind of content are redirected to other pages and receive notice that the previous site is inaccessible.<\/p>\n<p>On top of that, organizations worried about intellectual property or sensitive enterprise data might exploit DNS hijacking in defense, though the ethics of such moves are, well, murky. It\u2019s rare, but the line between security and overreach gets gray real fast\u2014sometimes a company&#8217;s &#8220;protection&#8221; detours honest users. It\u2019s not just the wild west of cybercriminals; surveillance-happy entities can put their own spin on DNS tampering, usually without much public debate.<\/p>\n<p>Not to say every instance outside of criminal behavior is automatically nefarious, but it shows how DNS hijacking isn\u2019t always painted in black and white. If you\u2019ve ever been redirected by a service provider for spell-checking a domain name, you\u2019ve seen the less sinister side. Still, it\u2019s a good reminder: the mechanism is the same, only the intent shifts.<\/p>\n<p>Some Internet service providers also use this protocol to display error messages when users attempt to access domains that do not exist. For example, if the user enters a wrong URL or one that is not registered with DNS, the error message NXDOMAIN is displayed.<\/p>\n<p>But before the user receives this response, the request goes through all levels of DNS to verify that entry&#8217;s existence. At that point, the Internet service provider intercepts the error message and redirects access to other environments, such as a popular page, the provider&#8217;s institutional website, or pages with advertisements, which increase business revenue.<\/p>\n<p><a id=\"how\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>How to prevent this type of attack on your website?<\/strong><\/h2>\n<p>DNS Hijacking is a widely used practice by cybercriminals and&nbsp;<strong>must be prevented with more effective control<\/strong>, which is possible through a&nbsp;<a href=\"https:\/\/pingback.com\/en\/resources\/hosting-security\/\" rel=\"noreferrer noopener\" target=\"_blank\">layered security strategy<\/a>. For example, a&nbsp;<strong>DNS-based security solution<\/strong>&nbsp;could have been used to impose a stricter policy on critical infrastructure devices and block malware once the &#8220;patient zero&#8221; intrusion is identified.<\/p>\n<p>Such early identification would allow the incident response team to fix the affected devices before other systems are infected.\u00a0<strong>Using trusted platforms, such as\u00a0<\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/rockcontent.com\/products\/stage\/\" target=\"_blank\"><strong>Rock Stage<\/strong><\/a>, is also a way to\u00a0<strong>prevent your <a href=\"https:\/\/pingback.com\/en\/resources\/wordpress\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"WordPress (opens in a new tab)\">WordPress<\/a> site from\u00a0<\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/pingback.com\/en\/resources\/website-security\/\" target=\"_blank\"><strong>being hacked<\/strong><\/a>\u00a0and to inhibit hackers and cybercriminals.<\/p>\n<p>However, users can&nbsp;<a href=\"https:\/\/pingback.com\/en\/resources\/wordpress-security\/\" rel=\"noreferrer noopener\" target=\"_blank\">increase their infrastructure&#8217;s security<\/a>&nbsp;with a few actions:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>change your router&#8217;s default password&nbsp;<\/strong>and disable the remote administration option;<\/li>\n<li>make constant updates to inhibit vulnerabilities and flaws that are not related to its use;<\/li>\n<li><strong>update&nbsp;<\/strong>the router&#8217;s firmware;<\/li>\n<li>use pop-up blocking tools;<\/li>\n<li>click on various areas of the website you intend to visit before writing any credentials (it is rare for the entire phishing page layout to be recreated);<\/li>\n<li><strong>check if the connection is secure&nbsp;<\/strong>by using https:\/\/ before the URL, and whether the site has any certificates or security protocols, such as&nbsp;<strong>TLS<\/strong>.<\/li>\n<\/ul>\n<p>DNS Hijacking can be used in many ways, but they are all illegitimate. After all, the user is not aware of the use of their digital identity: their device&#8217;s IP.<\/p>\n<p>As it was mentioned above, would you like to learn more about WordPress? Check out&nbsp;<a href=\"https:\/\/resources.rockcontent.com\/wordpress-guide\" rel=\"noreferrer noopener\" target=\"_blank\">this guide on how WordPress can help corporate blogs achieve results with Content Marketing<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/resources.rockcontent.com\/wordpress-guide\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-opt-id=466833331  data-opt-src=\"https:\/\/s3.amazonaws.com\/scribblelive-com-prod\/wp-content\/uploads\/2020\/08\/Materiais_750x200-banner-final.png\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"WordPress Guide for Corporate Blogs - Promotional Banner\" class=\"wp-image-13563\"><\/a><\/figure>\n<\/div>\n<p> }}<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS Hijacking is a form of intrusion that directs web traffic to unauthorized domain systems. That way, users&#8217; requests are intercepted and redirected to the attacker&#8217;s compromised DNS server.<\/p>\n","protected":false},"author":1,"featured_media":56541,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-63551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DNS hijacking: what it is and how to prevent it on your website<\/title>\n<meta name=\"description\" content=\"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS hijacking: what it is and how to prevent it on your website\" \/>\n<meta property=\"og:description\" content=\"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Pingback\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-30T10:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T19:09:51+00:00\" \/>\n<meta name=\"author\" content=\"Carolina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/\",\"url\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/\",\"name\":\"DNS hijacking: what it is and how to prevent it on your website\",\"isPartOf\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2020-08-30T10:00:36+00:00\",\"dateModified\":\"2025-09-09T19:09:51+00:00\",\"author\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33\"},\"description\":\"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.\",\"breadcrumb\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/pingback.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is DNS Hijacking and how to prevent it from happening on your website\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#website\",\"url\":\"https:\/\/pingback.com\/en\/resources\/\",\"name\":\"Pingback\",\"description\":\"Marketing for builders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pingback.com\/en\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33\",\"name\":\"Carolina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g\",\"caption\":\"Carolina\"},\"sameAs\":[\"https:\/\/pingback.com\"],\"url\":\"https:\/\/pingback.com\/en\/resources\/author\/adm1n\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS hijacking: what it is and how to prevent it on your website","description":"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/","og_locale":"pt_BR","og_type":"article","og_title":"DNS hijacking: what it is and how to prevent it on your website","og_description":"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.","og_url":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/","og_site_name":"Pingback","article_published_time":"2020-08-30T10:00:36+00:00","article_modified_time":"2025-09-09T19:09:51+00:00","author":"Carolina","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Carolina","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/","url":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/","name":"DNS hijacking: what it is and how to prevent it on your website","isPartOf":{"@id":"https:\/\/pingback.com\/en\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage"},"thumbnailUrl":"","datePublished":"2020-08-30T10:00:36+00:00","dateModified":"2025-09-09T19:09:51+00:00","author":{"@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33"},"description":"If you care about the security of your business and your visitors, you need to know what is a DNS hijacking to prevent data going into wrong hands.","breadcrumb":{"@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pingback.com\/en\/resources\/dns-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/pingback.com\/en\/resources\/dns-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/pingback.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is DNS Hijacking and how to prevent it from happening on your website"}]},{"@type":"WebSite","@id":"https:\/\/pingback.com\/en\/resources\/#website","url":"https:\/\/pingback.com\/en\/resources\/","name":"Pingback","description":"Marketing for builders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pingback.com\/en\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33","name":"Carolina","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g","caption":"Carolina"},"sameAs":["https:\/\/pingback.com"],"url":"https:\/\/pingback.com\/en\/resources\/author\/adm1n\/"}]}},"_links":{"self":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/comments?post=63551"}],"version-history":[{"count":2,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63551\/revisions"}],"predecessor-version":[{"id":127602,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63551\/revisions\/127602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/media?parent=63551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/categories?post=63551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/tags?post=63551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}