// API callback
related_results_labels_thumbs({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189"},"updated":{"$t":"2022-11-11T07:03:14.320-08:00"},"category":[{"term":"News"},{"term":"DDoS Attacks"},{"term":"DDoS Mitigation"},{"term":"DDoS Protection"},{"term":"Vulnerabilities"},{"term":"Online Games"},{"term":"UDP Attack Scripts"},{"term":"UDP DDoS Attacks"},{"term":"UDP Games"},{"term":"WordPress"},{"term":"featured"}],"title":{"type":"text","$t":"Hyperfilter DDoS Protection Solutions Blog"},"subtitle":{"type":"html","$t":"Hyperfilter DDoS Protection Solutions Blog"},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/-\/News?alt=json-in-script\u0026max-results=999"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/search\/label\/News"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"4"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"999"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189.post-3825388562702003566"},"published":{"$t":"2014-08-16T06:48:00.002-07:00"},"updated":{"$t":"2014-08-16T06:50:39.272-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"News"}],"title":{"type":"text","$t":"Internet routing 512K limitation"},"content":{"type":"html","$t":"\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-Xm8vmy-xhGw\/U-9g__8G2SI\/AAAAAAAAAFw\/ysWL73mhjTA\/s1600\/BN-EC006_Router_G_20140813104133.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-Xm8vmy-xhGw\/U-9g__8G2SI\/AAAAAAAAAFw\/ysWL73mhjTA\/s1600\/BN-EC006_Router_G_20140813104133.jpg\" height=\"213\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; font-family: Lato-Regular, arial, verdana, sans-serif; font-size: 14px; line-height: 19.600000381469727px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EIn the past two years we have been individually updating our clients about the (possible and most likely) upcoming issues with the internet.\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EMost people and companies were afraid off the issues year 2K might bring due to the possible bugs in software. Others got scared because of the major Cisco and Juniper router bugs that occurred in the past years, which brought down a large portion of the internet. And then there are some people that are always scared I guess...\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EAnyways, now the time has come that the internet will actually start to cripple and become unstable for a couple of weeks. This is what we have been warning many clients and other ISP about in the past years. Many have acted upon this, but we can say for sure that most have not acted yet.\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EIn the past years everyone heard (or should have) about the depletion of the IPv4 address space. Registries such as RIPE, who distribute those address blocks, thought it was a smart move to start and limit the size of each subnet that they distribute to their members who request additional address space. This has resulted in many subnet sizes of a \/22 (1024 IP addresses) up to a \/24 (256 IP addresses) to be distributed. Providers need to use these subnets across their infrastructure and as many providers have their infrastructure widely spread, this required them to divide those subnets into smaller portions, blocks. This is normal behavior, however as the subnets they received were already very small, there was not much to divide. Providers had to start dividing them into the smallest blocks possible that is allowed to be routed on the internet, which are \/24's (256 addresses).\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EUp till a few years ago, there were about 400K routes active on the internet (see reference 1). Since last Tuesday we have reached over 512K routes. This poses a serious problem all over the internet as many routers have hardware limit of 512K routes that can be installed in their forwarding table of their line-cards. Every brand and type of router will act differently when this limit is hit. We have seen Cisco routers crash\/reload (continuously). And other routers just not installing new routes, causing unavailability of parts of the internet. Last Tuesday we have been given a preview of these issues. Major providers like Level 3, AT\u0026amp;T, Cogent, Sprint and Verizon were having serious issues. And surely there were many more that should be added to this list.\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EThe crashes and other issues will be seen in the coming weeks all over the internet. We expect that from time to time there will be, as we call it, BGP flaps all over the internet. This will cause routes to changes back and forth for a few minutes or even hours, which on its turn could cause a domino effect or at least a non-optimal set of routes on the internet.\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EIt could be that many people will not notice this. But if you can not reach your local bank website, your company email or you just cannot reach your girlfriend by phone... Think about what we have said. And do not blame your local ISP -just yet-, as it can be very much any of the other 70.000 Internet Service Providers out there. Anyone provider that has been given an AS (Autonomous System) number and is between you and your destination (and\/or back) can be causing these issues. Just wait a minute and retry.\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EWe can now officially call the 12th of August 2014, the \"512k day\" (reference 5).\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003EReferences:\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E1. CIDR Active BGP entries (FIB): http:\/\/www.cidr-report.org\/cgi-bin\/plota?file=\/var\/data\/bgp\/as2.0\/bgp-active.txt\u0026amp;descr=Active BGP entries (FIB)\u0026amp;ylabel=Active BGP entries (FIB)\u0026amp;with=step\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E2. http:\/\/online.wsj.com\/articles\/y2k-meets-512k-as-internet-limit-approaches-1407937617\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E3. http:\/\/www.renesys.com\/2014\/08\/internet-512k-global-routes\/\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E4. http:\/\/arstechnica.com\/security\/2014\/08\/internet-routers-hitting-512k-limit-some-become-unreliable\/\u003C\/span\u003E\u003Cbr style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\" \/\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E5. http:\/\/en.wikipedia.org\/wiki\/512K\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cspan style=\"background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;\"\u003E6.\u0026nbsp;\u003C\/span\u003E\u003Cspan style=\"color: #404041;\"\u003E\u003Cspan style=\"line-height: 19.600000381469727px;\"\u003Ehttps:\/\/noc.nforce.com\/notifications\/informational\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/3825388562702003566\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/internet-routing-512k-limitation.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/3825388562702003566"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/3825388562702003566"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/internet-routing-512k-limitation.html","title":"Internet routing 512K limitation"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/2.bp.blogspot.com\/-Xm8vmy-xhGw\/U-9g__8G2SI\/AAAAAAAAAFw\/ysWL73mhjTA\/s72-c\/BN-EC006_Router_G_20140813104133.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189.post-536548319323832602"},"published":{"$t":"2014-08-10T15:22:00.000-07:00"},"updated":{"$t":"2014-08-10T15:47:33.004-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"News"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Vulnerabilities"},{"scheme":"http://www.blogger.com/atom/ns#","term":"WordPress"}],"title":{"type":"text","$t":"WordPress sites used for DDoS attacks with XML-RPC PingBack Vulnerability"},"content":{"type":"html","$t":"\u003Cdiv class=\"entry-body\" style=\"background-color: white; clear: both; padding-right: 20px;\"\u003E\u003Cdiv class=\"entry-body\" style=\"clear: both; color: #333333; line-height: 14pt; padding-right: 20px;\"\u003E\u003Cdiv class=\"separator\" style=\"clear: both; font-family: Helvetica, Verdana, 'Arial sans-serif'; font-size: 11pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/3.bp.blogspot.com\/-AHOtfxs3uQg\/U-ftxErxk7I\/AAAAAAAAAFg\/rC4KG2hwKsA\/s1600\/wordpress-ddos.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/3.bp.blogspot.com\/-AHOtfxs3uQg\/U-ftxErxk7I\/AAAAAAAAAFg\/rC4KG2hwKsA\/s1600\/wordpress-ddos.jpg\" height=\"166\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"font-size: 11pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Arial, Helvetica, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EThere were\u0026nbsp;\u003Ca href=\"http:\/\/www.net-security.org\/secworld.php?id=17227\" style=\"color: #0099ff;\" target=\"_blank\"\u003Enews stories this week\u003C\/a\u003E\u0026nbsp;outlining how attackers are\u0026nbsp;\u003Ca href=\"http:\/\/blog.sucuri.net\/2014\/03\/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html\" style=\"color: #0099ff;\" target=\"_self\"\u003Eabusing the XML-PRC \"pingback\" feature of WordPress blog sites to launch DDoS attacks\u0026nbsp;\u003C\/a\u003Eon other sites. \u0026nbsp;This blog post will provide some analysis on this attack and additional information for websites to protect themselves.\u003C\/span\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Ca href=\"https:\/\/www.blogger.com\/null\" id=\"more\" style=\"color: #0099ff; line-height: normal; text-decoration: underline;\"\u003E\u003C\/a\u003E\u003Cspan style=\"line-height: normal;\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"entry-more\" style=\"clear: both;\"\u003E\u003Ch1 style=\"color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cb\u003ENot A New Vulnerabilty\u003C\/b\u003E\u003C\/span\u003E\u003C\/h1\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EThe vulnerability in WordPress's XML-RPC API is not new. \u0026nbsp;Here is\u0026nbsp;\u003Ca href=\"https:\/\/core.trac.wordpress.org\/ticket\/4137\" style=\"color: #0099ff;\" target=\"_self\"\u003Edata from the WordPress bug tracker\u003C\/a\u003E\u0026nbsp;from 7 years ago.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; color: #333333; line-height: 14pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/3.bp.blogspot.com\/-zy227l_fJ9s\/U-fliQoRtMI\/AAAAAAAAAEo\/10wyrgmyouQ\/s1600\/01.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/3.bp.blogspot.com\/-zy227l_fJ9s\/U-fliQoRtMI\/AAAAAAAAAEo\/10wyrgmyouQ\/s1600\/01.png\" height=\"305\" width=\"400\" \/\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EWhile the vulnerability itself is not new, it has only been within the past couple years that attack code\/tools have\u0026nbsp;\u003Ca href=\"https:\/\/github.com\/FireFart\/WordpressPingbackPortScanner\" style=\"color: #0099ff;\" target=\"_self\"\u003Ebeen made available\u003C\/a\u003E. \u0026nbsp;This has certainly helped increase attacks by ScriptKiddies and resulted in more\u0026nbsp;\u003Ca href=\"http:\/\/www.incapsula.com\/blog\/wordpress-security-alert-pingback-ddos.html\" style=\"color: #0099ff;\" target=\"_self\"\u003Eactual DDoS attacks\u003C\/a\u003E.\u003C\/span\u003E\u003C\/div\u003E\u003Ch1 style=\"color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cb\u003EWordPress XML-RPC Pingback DDoS Attack Walkthrough\u003C\/b\u003E\u003C\/span\u003E\u003C\/h1\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EThe XML-RPC\u0026nbsp;\u003Ca href=\"http:\/\/codex.wordpress.org\/Introduction_to_Blogging#Using_Pingbacks_and_Trackbacks\" style=\"color: #0099ff;\" target=\"_self\"\u003Epingback functionality has a legitimate purpose\u003C\/a\u003E\u0026nbsp;with regards to linking blog content from different authors. \u0026nbsp;The issue is that this functionality can be abuse by attackers to use the XML-RPC pingback feature of a blog site to attack a 3rd party site.\u003C\/span\u003E\u003C\/div\u003E\u003Ch2 style=\"color: #333333; font-weight: normal; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"line-height: 14pt;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/h2\u003E\u003Ch2 style=\"color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"line-height: 14pt;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cb\u003EWordPress XML-RPC Pingback DDoS attack\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/h2\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EHere is an example attack command using curl -\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; color: #333333; line-height: 14pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-MLz-Nws8Vt0\/U-fl9yVcnBI\/AAAAAAAAAE4\/364Gj1YXVwE\/s1600\/03.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-MLz-Nws8Vt0\/U-fl9yVcnBI\/AAAAAAAAAE4\/364Gj1YXVwE\/s1600\/03.png\" height=\"88\" width=\"400\" \/\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EThe YELLOW highlighted data is a WordPress \"Patsy Proxy\" site while teh ORANGE highlighted data is the target\/victim website. \u0026nbsp;It is important to note for testing purposes that you must include the \"\u003Cem\u003E\u003Cstrong\u003EContent-Type: text\/xml\u003C\/strong\u003E\u003C\/em\u003E\" request header data otherwise the XML-RPC service will not treat the request as valid and will issue the following response:\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; color: #333333; line-height: 14pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/1.bp.blogspot.com\/-MRYac2b1Oh8\/U-fmKxBhgwI\/AAAAAAAAAFA\/iaK2oyEtDIA\/s1600\/04.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/1.bp.blogspot.com\/-MRYac2b1Oh8\/U-fmKxBhgwI\/AAAAAAAAAFA\/iaK2oyEtDIA\/s1600\/04.png\" height=\"148\" width=\"400\" \/\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EWith the previous request sent by the attacker, the Patsy Proxy WordPress site then initiates this HTTP request to the target\/victim site -\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; color: #333333; line-height: 14pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-nn2xn9tYOFo\/U-fmd6ved_I\/AAAAAAAAAFI\/s3ejknqSItU\/s1600\/05.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-nn2xn9tYOFo\/U-fmd6ved_I\/AAAAAAAAAFI\/s3ejknqSItU\/s1600\/05.png\" \/\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003ENotice that the format of the HTTP request is\u0026nbsp;\u003Cem\u003E\u003Cstrong\u003Eonly two lines\u003C\/strong\u003E\u003C\/em\u003E:\u003C\/span\u003E\u003Cbr \/\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003Cspan style=\"color: #2b2b2b; font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u0026nbsp;\u003C\/span\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;\"\u003EURI\u003C\/span\u003E\u003Cbr \/\u003E\u003Cspan style=\"color: #2b2b2b; font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u0026nbsp;\u003C\/span\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;\"\u003EHost request header\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EThis intelligence can be used by Web Application Firewalls (WAFs) that are protecting the victim sites to identify attack requests. \u0026nbsp;Normal web browsers send many more request headers. \u0026nbsp;While the pingback DDoS attack doesn't utilize any type of amplification as other more recent network protocol attacks (e.g. NTP), requests can cause more damage on the victim site if the URI is initiating a computationally expensive back-end query or process.\u003C\/span\u003E\u003C\/div\u003E\u003Ch1 style=\"color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cb\u003EProtections\u0026nbsp;\u003Cspan style=\"line-height: 14pt;\"\u003EDisable XML-RPC\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/h1\u003E\u003C\/div\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EIt is possible to disable the XML-RPC process altogether if you do not want to use it. \u0026nbsp;There are\u0026nbsp;\u003Ca href=\"http:\/\/wordpress.org\/plugins\/prevent-xmlrpc\/\" style=\"color: #0099ff;\" target=\"_self\"\u003Eeven plugins that will disable it.\u003C\/a\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cspan style=\"color: #333333;\"\u003EAlso there is a plugin for to make your wordpress faster and more secure:\u0026nbsp;\u003C\/span\u003E\u003Ca href=\"https:\/\/wordpress.org\/plugins\/wordfence\/\" style=\"color: #0099ff;\" target=\"_blank\"\u003Ehttps:\/\/wordpress.org\/plugins\/wordfence\/\u003C\/a\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Ch2 style=\"color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cb\u003EDisable Pingback Requests\u003C\/b\u003E\u003C\/span\u003E\u003C\/h2\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003EYou may also disable the pingback feature by adding the following to your functions.php file:\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; color: #333333; line-height: 14pt; text-align: center;\"\u003E\u003Ca href=\"http:\/\/1.bp.blogspot.com\/-6Zjx-cAifqg\/U-fmnuVODSI\/AAAAAAAAAFQ\/eGIYWerZJaE\/s1600\/06.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/1.bp.blogspot.com\/-6Zjx-cAifqg\/U-fmnuVODSI\/AAAAAAAAAFQ\/eGIYWerZJaE\/s1600\/06.png\" height=\"57\" width=\"320\" \/\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;\"\u003E\u003Cspan style=\"line-height: 14pt;\"\u003E\u003Cspan style=\"font-family: Verdana, sans-serif; font-size: 12px;\"\u003Esource: spiderlabs\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/536548319323832602\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/wordpress-sites-used-for-ddos-attacks.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/536548319323832602"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/536548319323832602"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/wordpress-sites-used-for-ddos-attacks.html","title":"WordPress sites used for DDoS attacks with XML-RPC PingBack Vulnerability"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/3.bp.blogspot.com\/-AHOtfxs3uQg\/U-ftxErxk7I\/AAAAAAAAAFg\/rC4KG2hwKsA\/s72-c\/wordpress-ddos.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189.post-1674881105603042211"},"published":{"$t":"2014-08-06T17:30:00.007-07:00"},"updated":{"$t":"2014-08-16T09:55:14.639-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"News"}],"title":{"type":"text","$t":"DDoS Attacks against Israel"},"content":{"type":"html","$t":"\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-JMv2-Pk4-QI\/U-RGBVdlz5I\/AAAAAAAAACY\/f1apQHa5g-g\/s1600\/3713483211.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-JMv2-Pk4-QI\/U-RGBVdlz5I\/AAAAAAAAACY\/f1apQHa5g-g\/s1600\/3713483211.jpg\" height=\"185\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EHacking attempts against Israeli networks and servers increased more than five-fold during the war in Gaza, according to a report released this week by network security specialists Arbor Networks.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EJust about all the attacks were Denial of Service (DDOS) attacks, in which the hackers attempt to overwhelm and shut down a server by directing an unsustainable volume of requests at it.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EThe volume of attacks began to rise in the first week of July, going from an average of 30 attacks per day in June to 150 attacks per day in July. The onslaught peaked on July 21, when 429 attacks were recorded.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EAttacks dropped precipitously on July 28, the day that an ultimately unsuccessful cease-fire was due to go into effect, and started rising again on August 3.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003ENot only the number of attacks was unprecedented during July. They were also unusual in size (the traffic directed at a specific server) and duration.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EIn June, no attack exceeded 12 Gbps. In July, seven attacks exceeded 12 Gbps, with the largest peaking at 22.56 Gbps on July 12.. The largest attack of all – at 29 Gbps – came on August 3, after cease-fire talks collapsed.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EThe average duration of an attack in June was 20 minutes with a peak duration of 24 hours. In July, the average duration was one hour and 39 minutes. An attack launched on July 19 was still in progress when the report was written, after approximately two weeks.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EThe report concludes that the number, size and duration of the DDoS attacks targeting Israel were proportional to the intensity of the conflict. The attackers, it says, appear to have made an effort to adhere to the “real world” calls for a cease-fire, resuming their attacks when the cease-fire ended or collapsed.\u003C\/span\u003E\u003Cbr \/\u003E\u003Cbr style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\" \/\u003E\u003Cspan style=\"background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;\"\u003EIn all, Israel was targeted by 5,346 DDOS attacks during the duration of the fighting.\u003C\/span\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/1674881105603042211\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/ddos-attacks-against-israel.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/1674881105603042211"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/1674881105603042211"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/ddos-attacks-against-israel.html","title":"DDoS Attacks against Israel"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/2.bp.blogspot.com\/-JMv2-Pk4-QI\/U-RGBVdlz5I\/AAAAAAAAACY\/f1apQHa5g-g\/s72-c\/3713483211.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4591647185267599189.post-3062373592328425340"},"published":{"$t":"2014-08-06T17:29:00.003-07:00"},"updated":{"$t":"2016-09-05T20:42:18.397-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Mitigation"},{"scheme":"http://www.blogger.com/atom/ns#","term":"DDoS Protection"},{"scheme":"http://www.blogger.com/atom/ns#","term":"News"}],"title":{"type":"text","$t":"New dedicated servers with DDoS Protection"},"content":{"type":"html","$t":"\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"http:\/\/3.bp.blogspot.com\/-XbF6sYGx4KM\/U-RNNWAMKAI\/AAAAAAAAAC0\/i5SrIvGc2qA\/s1600\/hfmed.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"https:\/\/3.bp.blogspot.com\/-XbF6sYGx4KM\/U-RNNWAMKAI\/AAAAAAAAAC0\/i5SrIvGc2qA\/s1600\/hfmed.png\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003EIts a pleasure to a\u003Cspan style=\"color: #2b2b2b;\"\u003Ennounce our new protected dedicated servers.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr \/\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003ELocation: Amsterdam, Netherlands\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px;\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Xeon E3-1240v3 16GB\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 16 GB RAM Advanced ECC\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 2 x 500GB SATA II 7200 RPM\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Hardware Raid 1\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 20TB bandwidth Premium Bandwidth [Clean Traffic]\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Network Port 1000 Mbps\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E• DDoS Protection\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• $449.99\/Month\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Ca href=\"https:\/\/www.hyperfilter.com\/panel\/cart.php?a=add\u0026amp;pid=48\" style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" target=\"_blank\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Order Now •\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Xeon E3-1240v3 32GB\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 32 GB RAM Advanced ECC\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 2 x 500GB SATA II 7200 RPM\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Hardware Raid 1\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 20TB bandwidth Premium Bandwidth [Clean Traffic]\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Network Port 1000 Mbps\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E• DDoS Protection\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• $489.99\/Month\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Ca href=\"https:\/\/www.hyperfilter.com\/panel\/cart.php?a=add\u0026amp;pid=53\" style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" target=\"_blank\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Order Now •\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Xeon E3-1240v3 32GB SSD\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 32 GB RAM Advanced ECC\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 2 x 240GB SSD\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Hardware Raid 1\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• 20TB bandwidth Premium Bandwidth [Clean Traffic]\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• Network Port 1000 Mbps\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E• DDoS Protection\u003C\/b\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E• $599.99\/Month\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Ca href=\"https:\/\/www.hyperfilter.com\/panel\/cart.php?a=add\u0026amp;pid=54\" style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" target=\"_blank\"\u003E\u003Cspan style=\"color: darkorange;\"\u003E• Order Now •\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cspan style=\"color: darkorange; font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u003Cb\u003EKey Points:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;Low False Positive Rate (\u0026lt;=1%)\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;Always on Protection State\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;\u003C\/span\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px;\"\u003EThe HyperFilter DDoS Protected Dedicated Servers, are branded hardware built by HP.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;They are placed in a redundant DoS\/DDoS Protected network with multiple 10GE carriers providing the best connectivity.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;A DoS\/DDoS Attack is mitigated nearly instantly, avoiding downtimes and side effects related with it.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;Quality is an important factor, our engineering team is always available for you.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;All kinds of DDoS attacks are mitigated into our systems and only the good traffic is allowed to pass.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;We aren’t resellers like the competition, we develop our mitigation technology daily, improving it day-by-day to become the most up to date and quality DDoS Protection available.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E•\u003C\/b\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , \u0026quot;geneva\u0026quot; , \u0026quot;lucida\u0026quot; , \u0026quot;lucida grande\u0026quot; , \u0026quot;arial\u0026quot; , \u0026quot;helvetica\u0026quot; , sans-serif; font-size: 12px; line-height: normal;\"\u003E\u0026nbsp;You will be protected against any kind of DDoS Attack, being TCP, UDP, ICMP, ARP, Socket Flooding and so on.\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cbr style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\" \/\u003E\u003C\/div\u003E\u003Cdiv style=\"color: #2b2b2b;\"\u003E\u003Cb style=\"font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 12px; line-height: normal;\"\u003E\u003Cspan style=\"color: darkorange;\"\u003EPlease feel free to contact our Sales Live Chat for more informations.\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/blog.hyperfilter.com\/feeds\/3062373592328425340\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/new-dedicated-servers-with-ddos.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/3062373592328425340"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/4591647185267599189\/posts\/default\/3062373592328425340"},{"rel":"alternate","type":"text/html","href":"http:\/\/blog.hyperfilter.com\/2014\/08\/new-dedicated-servers-with-ddos.html","title":"New dedicated servers with DDoS Protection"}],"author":[{"name":{"$t":"HyperFilter"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/17384447918541676594"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/3.bp.blogspot.com\/-XbF6sYGx4KM\/U-RNNWAMKAI\/AAAAAAAAAC0\/i5SrIvGc2qA\/s72-c\/hfmed.png","height":"72","width":"72"},"thr$total":{"$t":"0"}}]}});