{"id":69,"date":"2010-09-15T11:10:53","date_gmt":"2010-09-15T15:10:53","guid":{"rendered":"http:\/\/blog.wavecrestcomputing.com\/?p=69"},"modified":"2011-06-21T11:17:22","modified_gmt":"2011-06-21T15:17:22","slug":"detecting-and-controlling-unauthorized-outbound-connections","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/","title":{"rendered":"Detecting and Controlling Unauthorized Outbound Connections"},"content":{"rendered":"<p>Do you have a good handle on all outbound connections from your  network, and how do you know?\u00a0 Many times legitimate programs and  applications downloaded are creating outbound connections without your  knowledge or approval.\u00a0 This can cause a serious drain on an  organization&#8217;s network resources.\u00a0 This exact scenario recently happened  to a Wavecrest customer, and with the help of Wavecrest&#8217;s reports and  technical support specialists, they were able to locate a program that  was making 1,400+ outbound connections a day without their knowledge.<\/p>\n<p>Many  times, a program like this can be running in the background without the  organization&#8217;s knowledge and is not necessarily identifiable in the  process table.\u00a0 It can only be caught if an organization is monitoring  outbound Web connections through reports such as the ones in Wavecrest&#8217;s  Cyfin and CyBlock products.<\/p>\n<p>In this particular scenario, the  customer became knowledgeable of these unauthorized outbound connections  because there were a couple of users being locked out of their  computers.\u00a0 To troubleshoot the issue, they along with Wavecrest  technical support used the Authentication Manager in  their <a title=\"CyBlock Proxy\" href=\"https:\/\/wavecrest.net\/products\/cyblock\/sa\/index.html\">CyBlock Proxy<\/a> product to investigate.\u00a0 They found that the users&#8217;  computers were creating some outbound traffic that was not  authenticating with the proper credentials, thus eventually locking the  users out due to an authentication security setting the organization had  on their Active Directory configuration.\u00a0 By using the Authentication  Manager, <a title=\"real time web monitoring\" href=\"https:\/\/wwwnew\/products\/reporting.html#Webmonitor\">Real-time Web Monitor<\/a> and other reports, our technical support  specialists were able to identify the file that was making these  unauthorized outbound connections and remove it from the computers.<\/p>\n<p>This  scenario proves that it is important to be aware of what is going on in  your network, and Wavecrest&#8217;s products can help IT administrators do  that. There are several steps you can take to prevent and identify these  types of problems in your network.<\/p>\n<ol type=\"I\">\n<li><strong>Use reporting tools to spot unusual activity<\/strong>.\n<ol type=\"A\">\n<li><strong>Look for unusual patterns of Web activity.<\/strong>\n<ol>\n<li>Review Dashboard trends to spot any unexpected spikes in activity.<\/li>\n<li>Review Dashboard top sites and top categories charts to find any unexpected  sites or categories showing up in the top ten all of the sudden.<\/li>\n<li>Run  a Site Analysis report at least once a week and be alert to changes in  the volume and pattern of outbound Web activity. For example, if a  single user is suddenly logging thousands of visits a day, chances are  there&#8217;s an issue. That\u2019s because \u201chuman\u201d activity is usually more  random.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Watch the following categories: IP Address,  Spyware\/Malicious, Unsolicited or Push, Phishing\/Fraud and Uncategorized  &#8220;Other&#8221; Sites.<\/strong> High activity in these categories should raise a red  flag for administrators. High traffic volume here warrants further  investigation.<\/li>\n<li><strong>Identify the source of the problem.<\/strong> Dig  deeper by running a Category Audit Detail report to uncover both the  site and the affected user. If your Category Audit Detail report shows  an unusual number of hits to a specific Web site, that site is most  likely the source of the issue.\u00a0 You can also monitor the traffic in  real time using the <a title=\"real time monitor\" href=\"https:\/\/wwwnew\/products\/reporting.html#Webmonitor\">Real-Time Monitor<\/a> to uncover the site causing the  problem.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Update your Web-use management tools.<\/strong>\n<ol type=\"A\">\n<li><strong>Update your Acceptable Use Policy.<\/strong> Employees need to understand the risks of Web surfing. Minimize risks  of Internet abuse by implementing a policy to curtail at-work surfing  and communicate it clearly to employees.<\/li>\n<li><strong>Update your Wavecrest list.<\/strong> The Wavecrest control list is updated daily. We recommend downloading  your Wavecrest control list daily to minimize the number of visits  categorized as \u201cOther\u201d and ensure the best coverage possible. You can  set Cyfin and CyBlock to do this automatically on the <strong>Administration &#8211; URL List &#8211; Schedule<\/strong> screen. (<strong>Note:<\/strong> If you spot a problem Web site that is uncategorized, email it to us at  sites@wavecrest.net. Our site analysts will review the site  and categorize it appropriately.)<\/li>\n<\/ol>\n<\/li>\n<li><strong>Contact Wavecrest Technical Support.<\/strong> Our support specialist are always eager to help you troubleshoot any  issues you are having by helping you get the best out of the features  and tools our products offer.<\/li>\n<\/ol>\n<p>For more  information on how Wavecrest&#8217;s products can help keep your network safe,  we recommend you read our previous blog post on &#8220;<a href=\"https:\/\/blog.wavecrestcomputing.com\/?p=5\">Controlling Spyware<\/a>&#8221;  and &#8220;<a href=\"https:\/\/blog.wavecrestcomputing.com\/?p=35\">The Purpose of the IP Address Category<\/a>.&#8221;<\/p>\n<p><strong>Note:<\/strong> The program in question that is addressed in this post is the <strong>Akamai NetSession Interface<\/strong>.  It was hitting cn1.redswoosh.akadns.net and cn2.redswoosh.akadns.net  1400+ times a day. The program was located at C:\\Program Files\\Common  Files\\Akamai\\AdminTool.exe. To remove the program with Wavecrest&#8217;s help,  the customer:<\/p>\n<ol>\n<li>Opened the Command Prompt<\/li>\n<li>Went to the folder location by typing&#8221;Program Files\\Common Files\\Akamai&#8221;<\/li>\n<li>Then typed &#8220;admin uninstall-force&#8221; to remove it.<\/li>\n<\/ol>\n<p><strong>Remember:<\/strong> Our technical support specialists are here to help. If you ever need  help with your product configuration or see something unusual in a  report or on the real-time monitor that you are unsure about, please  feel free to contact Wavecrest technical support, and they will be happy  to help you.<\/p>\n<p><strong>Technical Support Contact Information<\/strong><br \/>\nDirect: 321-953-5351, ext. 4<br \/>\nToll-Free: 877-442-9346 ext. 4<br \/>\nEmail: support@wavecrest.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you have a good handle on all outbound connections from your network, and how do you know?\u00a0 Many times legitimate programs and applications downloaded are creating outbound connections without your knowledge or approval.\u00a0 This can cause a serious drain on an organization&#8217;s network resources.\u00a0 This exact scenario recently happened to a Wavecrest customer, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[77,11,12,9,206,18],"tags":[193,253,131,252,7,251,104],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-bandwidth-issues","category-cyblock","category-cyfin","category-security-threats","category-tech-tips","category-wavecrest-computing","tag-authentication-manager","tag-minimize-internet-risks","tag-network-security","tag-real-time-monitor","tag-spyware","tag-unauthorized-outbound-connections","tag-web-reporting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Do you have a good handle on all outbound connections from your network, and how do you know?\u00a0 Many times legitimate programs and applications downloaded are creating outbound connections without your knowledge or approval.\u00a0 This can cause a serious drain on an organization&#8217;s network resources.\u00a0 This exact scenario recently happened to a Wavecrest customer, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2010-09-15T15:10:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-06-21T15:17:22+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Detecting and Controlling Unauthorized Outbound Connections\",\"datePublished\":\"2010-09-15T15:10:53+00:00\",\"dateModified\":\"2011-06-21T15:17:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\"},\"wordCount\":849,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"keywords\":[\"authentication manager\",\"minimize internet risks\",\"network security\",\"real-time monitor\",\"Spyware\",\"unauthorized outbound connections\",\"web reporting\"],\"articleSection\":[\"Bandwidth Issues\",\"CyBlock\",\"Cyfin\",\"Security Threats\",\"Tech Tips\",\"Wavecrest Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\",\"name\":\"Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"datePublished\":\"2010-09-15T15:10:53+00:00\",\"dateModified\":\"2011-06-21T15:17:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detecting and Controlling Unauthorized Outbound Connections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/","og_locale":"en_US","og_type":"article","og_title":"Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog","og_description":"Do you have a good handle on all outbound connections from your network, and how do you know?\u00a0 Many times legitimate programs and applications downloaded are creating outbound connections without your knowledge or approval.\u00a0 This can cause a serious drain on an organization&#8217;s network resources.\u00a0 This exact scenario recently happened to a Wavecrest customer, and [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2010-09-15T15:10:53+00:00","article_modified_time":"2011-06-21T15:17:22+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Detecting and Controlling Unauthorized Outbound Connections","datePublished":"2010-09-15T15:10:53+00:00","dateModified":"2011-06-21T15:17:22+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/"},"wordCount":849,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"keywords":["authentication manager","minimize internet risks","network security","real-time monitor","Spyware","unauthorized outbound connections","web reporting"],"articleSection":["Bandwidth Issues","CyBlock","Cyfin","Security Threats","Tech Tips","Wavecrest Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/","url":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/","name":"Detecting and Controlling Unauthorized Outbound Connections - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"datePublished":"2010-09-15T15:10:53+00:00","dateModified":"2011-06-21T15:17:22+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/detecting-and-controlling-unauthorized-outbound-connections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Detecting and Controlling Unauthorized Outbound Connections"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":6,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/69\/revisions\/113"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}