{"id":1191,"date":"2025-04-15T12:54:33","date_gmt":"2025-04-15T10:54:33","guid":{"rendered":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/"},"modified":"2026-03-25T15:21:14","modified_gmt":"2026-03-25T14:21:14","slug":"rapid-proxy-rotation-explained","status":"publish","type":"post","link":"https:\/\/blog.kybervandals.com\/rapid-proxy-rotation-explained\/","title":{"rendered":"Rapid Proxy Rotation explained"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1.jpg\" alt=\"Rapid Proxy Rotation explained\" \/><\/p>\n<h2><strong>TL;DR<\/strong><\/h2>\n\n<blockquote><p><strong>Rapid Proxy Rotation is an effective DDoS attack technique that bypasses traditional rate-based detection and mitigation mechanisms.<\/strong><\/p><\/blockquote>\n<p>The use of Proxies in Layer-7-DDoS is evolving, as we wrote in <a href=\"https:\/\/blog.kybervandals.com\/bypassing-geofencing-in-modern-ddos-attacks\/\" rel=\"noreferrer\">2023<\/a> and <a href=\"https:\/\/blog.kybervandals.com\/bypassing-ddos-protection-with-proxies\/\" rel=\"noreferrer\">2024<\/a> already.<\/p>\n<p>In this article, we present a technique that allows attackers to bypass detection thresholds and rate limiting by leveraging proxy infrastructure. The technique is referred to as <strong>Rapid Proxy Rotation<\/strong>. It involves switching the source IP address for every individual request, significantly complicating detection.<\/p>\n<p>A simple calculation illustrates the impact: suppose an IoT botnet consists of 1,000 IPs, each capable of generating 100 requests per second (RPS). This results in 100,000 RPS in total\u2014but with each IP pushing 100 RPS, the activity is noisy and easily flagged.<\/p>\n<p>Now consider the use of a large-scale proxy service, such as <a href=\"https:\/\/blog.kybervandals.com\/bypassing-ddos-protection-with-proxies\/\" rel=\"noreferrer\">one described here<\/a>, which is based on residential proxies. By proxying traffic through 10,000 rotating IPs instead of 1,000, the same 100,000 RPS workload is distributed more evenly. Each IP now only emits 10 RPS\u2014<strong>reducing the signal per IP by 90%<\/strong> and making the attack much harder to detect. Scaling up the proxy pool further would reduce the per-IP RPS even more.<\/p>\n<p>The proxy services we tested\u2014particularly paid providers\u2014support assigning a unique IP per request, which enables true Rapid Proxy Rotation. When combined with other techniques such as randomized User-Agent-Headers and multi-target or multi-vector strategies, this results in a morphing attack pattern that is extremely difficult to defend against from the defender&#8217;s perspective.<\/p>\n<p>This method evades rate-based detection mechanisms and, as an additional advantage for attackers, effectively bypasses GeoIP-based blocking strategies as well. <\/p>\n<p>The following two visualizations support the practical viability of this method:<\/p>\n<ol>\n<li>The first graph displays the &#8222;Most Active IPs&#8220; during an active attack, indirectly confirming that most IPs operate at a low and stealthy rate (1\u20132 RPS).<\/li>\n<li>The second graph illustrates the ISPs involved in an attack that was proxied via German infrastructure.<\/li>\n<\/ol>\n\n<figure class=\"kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/04\/r4.png\" class=\"kg-image\" alt=\"Rapid Proxy Rotation explained\" width=\"954\" height=\"530\" \/><figcaption><span>RPS pro IP, in Rapid Proxy Rotation<\/span><\/figcaption><\/figure>\n\n<figure class=\"kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/04\/r1.png\" class=\"kg-image\" alt=\"Rapid Proxy Rotation explained\" width=\"962\" height=\"584\" \/><figcaption><span>German ISPs, during a Proxy-Attack<\/span><\/figcaption><\/figure>\n\n<h3><\/h3>\n<h3>References<\/h3>\n\n<ul>\n<li><a href=\"https:\/\/blog.kybervandals.com\/bypassing-ddos-protection-with-proxies\/\" rel=\"noreferrer\">Bypassing DDoS-Protection with Proxies, an investigation (2024)<\/a><\/li>\n<li><a href=\"https:\/\/blog.kybervandals.com\/bypassing-geofencing-in-modern-ddos-attacks\/\" rel=\"noreferrer\">Bypassing GeoFencing in advanced Layer-7 DDoS Attacks (2023)<\/a><\/li>\n<\/ul>\n<p>Here are several key vendor reports that discuss the use of proxies in Layer 7 DDoS attacks:\u200b<\/p>\n\n<ol>\n<li><strong>NETSCOUT Threat Intelligence Report (Q4 2024)<\/strong>\n<ul>\n<li>NETSCOUT observed a persistent reliance on proxy infrastructure in application-layer DDoS attacks. Proxies, particularly cloud and residential, were key enablers for HTTPS floods, accounting for over 10\u201320% of attack sources. Both HTTP and DNS attack traffic increasingly exhibited proxy-driven characteristics. \u200b <a href=\"https:\/\/www.netscout.com\/threatreport\/?utm_source=chatgpt.com\" rel=\"noopener\">[Netscout]<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Microsoft&#8217;s Response to Layer 7 DDoS Attacks (June 2023)<\/strong>\n<ul>\n<li>In June 2023, Microsoft identified surges in traffic against some services, attributed to attacks likely relying on access to multiple virtual private servers (VPS) in conjunction with rented cloud infrastructure, open proxies, and DDoS tools. \u200b<a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/06\/microsoft-response-to-layer-7-distributed-denial-of-service-ddos-attacks\/?utm_source=chatgpt.com\" rel=\"noopener\">Microsoft Security Response Center<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>StormWall Q3 2023 DDoS Attack Report<\/strong>\n<ul>\n<li>StormWall reported a significant uptick in the deployment of mixed DDoS botnets, which utilize various types of malware in a single attack campaign. These botnets often employ proxies to mask the origin of traffic, enhancing the complexity and resilience of attacks. \u200b<a href=\"https:\/\/stormwall.network\/resources\/blog\/ddos-report-q3-2023?utm_source=chatgpt.com\" rel=\"noopener\">stormwall.network<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Cloudflare DDoS Threat Report for Q4 2024<\/strong>\n<ul>\n<li>Cloudflare mitigated 6.9 million DDoS attacks in Q4 2024, with 51% being HTTP DDoS attacks. The majority of these attacks (73%) were launched by known botnets, many of which utilize proxy services to obfuscate traffic sources. \u200b<a href=\"https:\/\/blog.cloudflare.com\/ddos-threat-report-for-2024-q4\/?utm_source=chatgpt.com\" rel=\"noopener\">The Cloudflare Blog<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Akamai&#8217;s Retrospective on DDoS Trends in 2023<\/strong>\n<ul>\n<li>Akamai noted that throughout 2023, DDoS attacks became more frequent and sophisticated, often employing multiple vectors. The use of proxies was highlighted as a method to enhance the stealth and effectiveness of Layer 7 attacks. \u200b<a href=\"https:\/\/www.akamai.com\/blog\/security\/a-retrospective-on-ddos-trends-in-2023?utm_source=chatgpt.com\" rel=\"noopener\">Akamai<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>TL;DR Rapid Proxy Rotation is an effective DDoS attack technique that bypasses traditional rate-based detection and mitigation mechanisms. The use of Proxies in Layer-7-DDoS is evolving, as we wrote in 2023 and 2024 already. In this article, we present a technique that allows attackers to bypass detection thresholds and rate limiting by leveraging proxy infrastructure. [&hellip;]<\/p>","protected":false},"author":2,"featured_media":1192,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"https:\/\/blog.kybervandals.com\/rapid-proxy-rotation-explained\/","_links_to_target":"_blank"},"categories":[1],"tags":[],"class_list":["post-1191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rapid Proxy Rotation explained - avydos.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/avydos.com\/en\/rapid-proxy-rotation-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rapid Proxy Rotation explained - avydos.com\" \/>\n<meta property=\"og:description\" content=\"TL;DR Rapid Proxy Rotation is an effective DDoS attack technique that bypasses traditional rate-based detection and mitigation mechanisms. The use of Proxies in Layer-7-DDoS is evolving, as we wrote in 2023 and 2024 already. In this article, we present a technique that allows attackers to bypass detection thresholds and rate limiting by leveraging proxy infrastructure. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/avydos.com\/en\/rapid-proxy-rotation-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"avydos.com\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-15T10:54:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T14:21:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1998\" \/>\n\t<meta property=\"og:image:height\" content=\"935\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Monja Janneck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monja Janneck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/\"},\"author\":{\"name\":\"Monja Janneck\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\"},\"headline\":\"Rapid Proxy Rotation explained\",\"datePublished\":\"2025-04-15T10:54:33+00:00\",\"dateModified\":\"2026-03-25T14:21:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/\"},\"wordCount\":580,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg\",\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/\",\"url\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/\",\"name\":\"Rapid Proxy Rotation explained - avydos.com\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg\",\"datePublished\":\"2025-04-15T10:54:33+00:00\",\"dateModified\":\"2026-03-25T14:21:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg\",\"width\":1998,\"height\":935},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/avydos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rapid Proxy Rotation explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/avydos.com\/#website\",\"url\":\"https:\/\/avydos.com\/\",\"name\":\"avydos.com\",\"description\":\"Avydos ist ein DDoS-Stresstest-Selftesting-Service f\u00fcr Security Engineers: DDoS-Bedrohungssimulationen selbstst\u00e4ndig testen unter realen Angriffs-Bedingungen.\",\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/avydos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/avydos.com\/#organization\",\"name\":\"Avydos by zeroBS GmbH\",\"alternateName\":\"Avydos by zeroBS GmbH\",\"url\":\"https:\/\/avydos.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"width\":256,\"height\":256,\"caption\":\"Avydos by zeroBS GmbH\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\",\"name\":\"Monja Janneck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"caption\":\"Monja Janneck\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rapid Proxy Rotation explained - avydos.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/avydos.com\/en\/rapid-proxy-rotation-explained\/","og_locale":"en_GB","og_type":"article","og_title":"Rapid Proxy Rotation explained - avydos.com","og_description":"TL;DR Rapid Proxy Rotation is an effective DDoS attack technique that bypasses traditional rate-based detection and mitigation mechanisms. The use of Proxies in Layer-7-DDoS is evolving, as we wrote in 2023 and 2024 already. In this article, we present a technique that allows attackers to bypass detection thresholds and rate limiting by leveraging proxy infrastructure. [&hellip;]","og_url":"https:\/\/avydos.com\/en\/rapid-proxy-rotation-explained\/","og_site_name":"avydos.com","article_published_time":"2025-04-15T10:54:33+00:00","article_modified_time":"2026-03-25T14:21:14+00:00","og_image":[{"width":1998,"height":935,"url":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg","type":"image\/jpeg"}],"author":"Monja Janneck","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Monja Janneck","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#article","isPartOf":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/"},"author":{"name":"Monja Janneck","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393"},"headline":"Rapid Proxy Rotation explained","datePublished":"2025-04-15T10:54:33+00:00","dateModified":"2026-03-25T14:21:14+00:00","mainEntityOfPage":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/"},"wordCount":580,"commentCount":0,"publisher":{"@id":"https:\/\/avydos.com\/#organization"},"image":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg","articleSection":["Allgemein"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/","url":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/","name":"Rapid Proxy Rotation explained - avydos.com","isPartOf":{"@id":"https:\/\/avydos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage"},"image":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg","datePublished":"2025-04-15T10:54:33+00:00","dateModified":"2026-03-25T14:21:14+00:00","breadcrumb":{"@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/avydos.com\/rapid-proxy-rotation-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#primaryimage","url":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/04\/harry-shelton-T9wzRua7FYo-unsplash-1-y8yHL9.jpeg","width":1998,"height":935},{"@type":"BreadcrumbList","@id":"https:\/\/avydos.com\/rapid-proxy-rotation-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/avydos.com\/"},{"@type":"ListItem","position":2,"name":"Rapid Proxy Rotation explained"}]},{"@type":"WebSite","@id":"https:\/\/avydos.com\/#website","url":"https:\/\/avydos.com\/","name":"avydos.com","description":"Avydos is a DDoS stress test self-testing service for security engineers: test DDoS threat simulations independently under real attack conditions.","publisher":{"@id":"https:\/\/avydos.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/avydos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/avydos.com\/#organization","name":"Avydos by zeroBS GmbH","alternateName":"Avydos by zeroBS GmbH","url":"https:\/\/avydos.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/","url":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","width":256,"height":256,"caption":"Avydos by zeroBS GmbH"},"image":{"@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393","name":"Monja Janneck","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","caption":"Monja Janneck"}}]}},"_links":{"self":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/comments?post=1191"}],"version-history":[{"count":1,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1191\/revisions"}],"predecessor-version":[{"id":1478,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1191\/revisions\/1478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media\/1192"}],"wp:attachment":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media?parent=1191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/categories?post=1191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/tags?post=1191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}