{"id":5269,"date":"2023-06-27T06:38:06","date_gmt":"2023-06-27T06:38:06","guid":{"rendered":"\/cybersecurity-blog\/?p=5269"},"modified":"2025-07-02T11:26:05","modified_gmt":"2025-07-02T11:26:05","slug":"residential-proxy-for-your-traffic","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/","title":{"rendered":"Hide Traces of Sandbox Usage from Your Traffic with Residential Proxy\u00a0"},"content":{"rendered":"\n<p>In ANY.RUN, we have proprietary mechanisms in place to keep malware from realizing it&#8217;s in a sandbox. <strong>We&#8217;re rolling out another feature to mask sandbox activity \u2014 Residential proxy (RP)<\/strong>. Now, you\u2019ll be able to allocate a home users\u2019 IP address to your VMs, effectively erasing any traces that can hint at a sandbox environment from your network traffic.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Here\u2019s what it means in practice:&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Understand malware behavior better<\/strong>: because malware won&#8217;t detect sandbox or data center\u2019s IP, it will behave normally, allowing for accurate analysis.&nbsp;<\/li>\n\n\n\n<li><strong>Bypass geo-restrictions<\/strong>: emulate local users to analyze region-specific threats.&nbsp;<\/li>\n\n\n\n<li><strong>Investigate C2 traffic without giving yourself away<\/strong>: your connection will mimic an infected user. &nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Residential proxy&#8217;s greatest power is in analysis of geo-targeted attacks \u2014 especially when dealing with phishing. In some phishing campaigns, users are rerouted to different pages based on their geographic location. And some attacks analyze if the traffic is coming from a hosting to detect sandboxes. But with our new feature, you can effectively sidestep these detection attempts.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how it all works in practice.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Avoid anti-analysis techniques&nbsp;<\/h2>\n\n\n\n<p>In our initial analysis of <a href=\"https:\/\/app.any.run\/tasks\/7f63bcd5-a16a-4a67-96a1-b1696a920916?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=residentialproxy&amp;utm_content=task1\" target=\"_blank\" rel=\"noreferrer noopener\">this Xworm sample<\/a>, we ran into a challenge. The sample is designed to detect traffic from a host and stops executing if it detects a sandbox environment. It sends a request to <em>ip-api[.]com<\/em>, checking for the &#8216;hosting&#8217; parameter. If the returned response is &#8216;true&#8217;, execution is aborted.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how the network stream looks like without Residential proxy:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"733\" height=\"620\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-33.png\" alt=\"Network stream without Residential proxy\" class=\"wp-image-5270\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-33.png 733w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-33-300x254.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-33-370x313.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-33-270x228.png 270w\" sizes=\"(max-width: 733px) 100vw, 733px\" \/><\/figure>\n\n\n\n<p>Typically, malware employs this strategy to evade sandboxes, assuming that regular user traffic wouldn&#8217;t originate from a hosting service.&nbsp;<\/p>\n\n\n\n<p>We can evade detection by activating the Residential proxy and <a href=\"https:\/\/app.any.run\/tasks\/b01576f9-daad-4f90-a9bd-869edaefac12?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=residentialproxy&amp;utm_content=task2\" target=\"_blank\" rel=\"noreferrer noopener\">re-running the task:<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"837\" height=\"690\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34.png\" alt=\"Activating the Residential proxy in ANY.RUN\" class=\"wp-image-5272\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34.png 837w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34-300x247.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34-768x633.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34-370x305.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34-270x223.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-34-740x610.png 740w\" sizes=\"(max-width: 837px) 100vw, 837px\" \/><\/figure>\n\n\n\n<p>To do so, simply check the Residential proxy checkbox during your environment configuration. Then, choose the geolocation of your IP.&nbsp;<\/p>\n\n\n\n<p>This time around, <em>ip-api[.]com<\/em> responds with a &#8216;false&#8217; when queried if the traffic originates from a hosting site. As a result, the sample executes fully. This evasion worked because the Residential proxy masked the hosting origin of the traffic.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analyze geo-targeting phishing websites more accurately&nbsp;<\/h2>\n\n\n\n<p>Now, you can also use the Residential proxy to analyze geo-targeted phishing campaigns faster and better. Some phishing websites target users from a particular country, verifying their origin before displaying the page. If the users \u2014 or analysts \u2014 aren&#8217;t from the target country, they&#8217;re left staring at a blank screen.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Here&#8217;s an <a href=\"https:\/\/app.any.run\/tasks\/7216e05c-5b48-42ba-8253-607ada01c3b4?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=residentialproxy&amp;utm_content=task3\" target=\"_blank\" rel=\"noreferrer noopener\">example of a suspicious website<\/a> that targets users from Italy. Noticing that its domain name was registered 2 weeks ago at the time of analysis, we decided to investigate further. But first, we analyzed it without selecting a proxy.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"516\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-1024x516.png\" alt=\"Sample analysis without selecting a proxy.\u00a0\" class=\"wp-image-5273\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-1024x516.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-300x151.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-768x387.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-370x187.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-270x136.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35-740x373.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-35.png 1101w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Predictably, the webpage hasn\u2019t loaded. But we can fix this by setting the proxy to Italy and re-launching the task. Here\u2019s the same website with proxy set to Italy:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-1024x640.png\" alt=\"Sample analysis with proxy set to Italy\" class=\"wp-image-5277\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-1024x640.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-300x187.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-768x480.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-370x231.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-270x169.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45-740x462.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Screenshot-at-Jun-27-10-55-45.png 1439w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>That\u2019s better!&nbsp;&nbsp;<\/p>\n\n\n\n<p>That\u2019s how the Residential proxy improves our ability to analyze malicious and potentially harmful samples and websites. It gives analysts the tools they need to extract maximum information from each analysis.&nbsp;<\/p>\n\n\n\n<p>Apply for <a href=\"https:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=residentialproxy&amp;utm_content=demo\" target=\"_blank\" rel=\"noreferrer noopener\">14 days free trial of ANY.RUN<\/a> to test this feature.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In ANY.RUN, we have proprietary mechanisms in place to keep malware from realizing it&#8217;s in a sandbox. We&#8217;re rolling out another feature to mask sandbox activity \u2014 Residential proxy (RP). Now, you\u2019ll be able to allocate a home users\u2019 IP address to your VMs, effectively erasing any traces that can hint at a sandbox environment [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5278,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,15,34,40],"class_list":["post-5269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-malware","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hide Traces of Sandbox Usage from Traffic with Residential Proxy<\/title>\n<meta name=\"description\" content=\"New ANY.RUN feature \u2014 Residential proxy. Allocate a users\u2019 IP address to VMs, erasing any sandbox traces from network traffic.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Hide Traces of Sandbox Usage from Your Traffic with Residential Proxy\u00a0\",\"datePublished\":\"2023-06-27T06:38:06+00:00\",\"dateModified\":\"2025-07-02T11:26:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\",\"name\":\"Hide Traces of Sandbox Usage from Traffic with Residential Proxy\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-06-27T06:38:06+00:00\",\"dateModified\":\"2025-07-02T11:26:05+00:00\",\"description\":\"New ANY.RUN feature \u2014 Residential proxy. Allocate a users\u2019 IP address to VMs, erasing any sandbox traces from network traffic.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hide Traces of Sandbox Usage from Your Traffic with Residential Proxy\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hide Traces of Sandbox Usage from Traffic with Residential Proxy","description":"New ANY.RUN feature \u2014 Residential proxy. Allocate a users\u2019 IP address to VMs, erasing any sandbox traces from network traffic.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Hide Traces of Sandbox Usage from Your Traffic with Residential Proxy\u00a0","datePublished":"2023-06-27T06:38:06+00:00","dateModified":"2025-07-02T11:26:05+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware","malware analysis","malware behavior"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/","url":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/","name":"Hide Traces of Sandbox Usage from Traffic with Residential Proxy","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-06-27T06:38:06+00:00","dateModified":"2025-07-02T11:26:05+00:00","description":"New ANY.RUN feature \u2014 Residential proxy. Allocate a users\u2019 IP address to VMs, erasing any sandbox traces from network traffic.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Hide Traces of Sandbox Usage from Your Traffic with Residential Proxy\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5269"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5269"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5269\/revisions"}],"predecessor-version":[{"id":14582,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5269\/revisions\/14582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/5278"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}