{"id":22044,"date":"2025-11-26T19:32:17","date_gmt":"2025-11-26T18:32:17","guid":{"rendered":"https:\/\/www.transparentedge.eu\/?page_id=22044"},"modified":"2026-02-03T10:54:59","modified_gmt":"2026-02-03T09:54:59","slug":"ddos-attacks-use-case","status":"publish","type":"page","link":"https:\/\/www.transparentedge.eu\/en\/solutions\/use-cases\/ddos-attacks-use-case\/","title":{"rendered":"DDoS attacks"},"content":{"rendered":"\r\n\r\n<section id=\"apertura-productos-sin-cuadro-71804\" class=\"apertura-productos-sin-cuadro apertura-productos-sin-cuadro\" >\r\n\t\t\t<div class=\"image-deco\" id=\"apr-cdn-image-deco\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/Frame_ataques_ddos.svg\" alt=\"\u00edcono hacker\" \/>\t\t<\/div>\r\n\t\t<div class=\"container\">\r\n\t\t<div class=\"inner\">\r\n\t\t\t\r\n\t\t\t<div class=\"row-card\" id=\"apr-cdn-row-card\">\r\n\t\t\t\t<div class=\"main-card ancho\">\r\n\t\t\t\t\t\t\t\t\t\t<h1>\r\n\t\t\t\t\t\t<p><span style=\"font-weight: 600;\">DDoS attacks<\/span><\/p>\n\t\t\t\t\t<\/h1>\r\n\t\t\t\t\t<div class=\"text\">\r\n\t\t\t\t\t\t<p>When a public institution experienced repeated website outages caused by coordinated distributed denial-of-service (DDoS) attacks, it decided to take steps to regain control of its operations.<\/p>\n<p>The institution turned to Transparent Edge to maintain the availability of its portals, reduce the operational impact of invalid traffic, and achieve immediate stability without restructuring internal processes.<\/p>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/how-transparent-edge-secured-a-public-institutions-website\/\"  class=\"button white-button with-arrow\">Read the full story<\/a>\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"wrapp-image\" id=\"apr-cdn-img-1\">\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/11\/TE-1400x1700-web.jpg\" alt=\"\" \/>\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"servicios-39415\" class=\"servicios servicios\"  >\r\n\t<span class=\"image-deco\"><\/span>\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"wrapper wrapper__left\">\r\n\t\t\t\t<h2>Use <strong>case<\/strong>\n<\/h2>\r\n\t\t\t<\/div>\r\n\t\t\r\n\r\n            \r\n\t\t\t<div class=\"wrapper wrapper__right\">\r\n\t\t\t\t\r\n\r\n\t\t\t\t<div class=\"cards-container\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-wrapper\">\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"card-title\">\r\n\t\t\t\t\t\t\t\t\t\t\tThe vulnerability:\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-text\"><p>The combination of high visibility, hacktivist attacks, and an infrastructure with little tolerance for concurrent traffic created a constant operational risk.<\/p>\n<p>The impact was significant:<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Website outages prevented access to information and subjected the IT team to constant operational pressure.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">The non-resilient origin server quickly became overloaded, returning HTTP 504 (Gateway Timeout) errors even under moderate sustained traffic.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Volumetric and Layer 7 attacks, intensified by groups like NoName057, exposed the organization&#8217;s vulnerability.<\/li>\n<\/ul>\n<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-wrapper\">\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"card-title\">\r\n\t\t\t\t\t\t\t\t\t\t\tTransparent Edge&#8217;s response:\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"card-text\"><p>When Transparent Edge is called into action, it quickly develops a layered defense strategy that mitigates the problem in real time and provides visibility into attack patterns.<\/p>\n<h3>Immediate actions<\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Immediate activation of UAM mode:<\/strong> establishes &#8220;under attack&#8221; mode to block non-human traffic and stop the attack in progress.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>DDoS protection:<\/strong> activates Anti-DDoS for layers 3, 4, and 7 and sets a rate limit with a maximum request threshold beyond which traffic is blocked.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Caching policies:<\/strong> to respond to specific incidents, caching of static files and HTML is prioritized, preventing excessive resource consumption and drastically reducing requests to the origin.<\/li>\n<\/ul>\n<h3>Deployment of protection strategy<\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Anomaly detection:<\/strong> They implement tools to monitor behavior patterns and provide tailored responses (JS challenges, captchas, auto-blacklisting). They enable notifications or countermeasures as needed.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>IP scoring:<\/strong> They set a threshold to block IPs with low reputation or ASNs with high scores. For IPs originating from outside Spain, UAM is activated.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Controlled whitelists:<\/strong> Legitimate scraping and third-party services can access the whitelist if they meet certain predefined thresholds.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Redirects using regular expressions:<\/strong> To prevent attack vectors based on the composition of friendly permalinks.<\/li>\n<\/ul>\n<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n           \r\n\r\n\t\t<\/div>\t\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"tarjetas-icono-titulo-56702\" class=\"tarjetas-icono-titulo\" >\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"container\">\r\n\t\t\t\t\t\t\t<div class=\"cards grid-to-slider-mobile\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/aqua_icono_10_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Our actions produce results<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>In addition to stopping the attacks, the implementation optimized content delivery, preventing user concurrency from crashing the portals, repelling cyberattacks, and stabilizing the experience for legitimate users.<\/p>\n<p>The objectives of ensuring service availability even during DDoS attacks were met.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/aqua_icono_26_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>For websites with high exposure to DDoS attacks, it is vital to:<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Implement anti-DDoS measures at layers 3, 4, and 7 to discard invalid traffic before it reaches the origin.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">A technical team with knowledge of attack scenarios for rapid, real-time data analysis and threshold tuning.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Operational observability for proactive decision-making.<\/li>\n<\/ul>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/TE_aqua_icono_49_3x-150x150.png\" alt=\"Equipo\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>What can Transparent Edge do?<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>We&#8217;ll support you with our team&#8217;s expertise in implementing customized restrictions and optimizations tailored to your business needs. With comprehensive layers of security, detection, and mitigation, see how you can gain control of your environment and safeguard your digital sales channel.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\r\n\t\t\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/contact\/\"  class=\"button with-arrow\">Talk to an expert<\/a>\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\t\r\n\t<\/div>\r\n\t\r\n<\/section>\n\n\n<section id=\"destacado-texto-boton-73677\" class=\"destacado-texto-boton destacado-texto-boton big\">\n\t<div class=\"full-container\">\n\t\t<div class=\"inner\">\n\t\t\t<div class=\"text\">\n\t\t\t\t<p>Do you want to read the full story of how Transparent Edge was able to mitigate DDoS attacks, ensuring the availability of high-profile public websites?<\/p>\n\n\t\t\t\t\t\t\t\t\t<div class=\"wrapper-button\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/how-transparent-edge-secured-a-public-institutions-website\/\"  class=\"button with-arrow\">Read the full story<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":18,"featured_media":0,"parent":22406,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22044","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS attacks - Transparent Edge<\/title>\n<meta name=\"description\" content=\"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS attacks - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T09:54:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1806\" \/>\n\t<meta property=\"og:image:height\" content=\"1144\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/ddos-attacks-use-case\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/ddos-attacks-use-case\\\/\",\"name\":\"DDoS attacks - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"datePublished\":\"2025-11-26T18:32:17+00:00\",\"dateModified\":\"2026-02-03T09:54:59+00:00\",\"description\":\"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/ddos-attacks-use-case\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/ddos-attacks-use-case\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/ddos-attacks-use-case\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS attacks - Transparent Edge","description":"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/","og_locale":"en_US","og_type":"article","og_title":"DDoS attacks - Transparent Edge","og_description":"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.","og_url":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/","og_site_name":"Transparent Edge","article_modified_time":"2026-02-03T09:54:59+00:00","og_image":[{"width":1806,"height":1144,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/","url":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/","name":"DDoS attacks - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"datePublished":"2025-11-26T18:32:17+00:00","dateModified":"2026-02-03T09:54:59+00:00","description":"When a public institution experienced repeated website outages decided to take steps to regain control of its operations.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/en\/ddos-attacks-use-case\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"DDoS attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/22044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=22044"}],"version-history":[{"count":7,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/22044\/revisions"}],"predecessor-version":[{"id":22405,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/22044\/revisions\/22405"}],"up":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/22406"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=22044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}