{"id":70273,"date":"2025-03-27T17:49:34","date_gmt":"2025-03-27T17:49:34","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70273"},"modified":"2025-08-28T10:29:51","modified_gmt":"2025-08-28T09:29:51","slug":"unravelling-cyber-defense-model-secrets-password-spray-detections","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections","title":{"rendered":"Unravelling Cyber Defense Model Secrets: Password Spray Detections"},"content":{"rendered":"<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p class=\"ai-optimize-7 ai-optimize-introduction\"><em>Welcome to the Unravelling Cyber Defense Model Secrets series, where we shine a light on how our Data Science team is keeping up with the latest detections.<\/em><\/p>\n<p class=\"ai-optimize-8\">When it comes to cybersecurity, some of the oldest tricks are still among the most dangerous.\u00a0Weak or default passwords\u00a0continue to be a top target for attackers, and one tactic that\u2019s quietly gaining traction is the\u00a0password spray attack.<\/p>\n<p class=\"ai-optimize-9\">Unlike brute-force methods, password spraying takes a stealthier approach. It uses a short list of common passwords across a wide range of accounts, often slipping under the radar of lockout policies and traditional detection tools.<\/p>\n<p class=\"ai-optimize-10\">As these attacks evolve in sophistication and scale, organizations, especially those with limited IT resources, need smarter, more adaptive ways to detect and respond before damage is done. In this post, we\u2019ll break down how password spray attacks work, why they\u2019re so effective, and what you can do to protect your environment.<\/p>\n<h2 class=\"ai-optimize-11\">How Password Sprays Work<\/h2>\n<p class=\"ai-optimize-12\">Passwords are critical for preventing unauthorized access and securing sensitive information yet are often relegated to defaults that are never changed or are too easy to guess. Threats associated with weak passwords prominently include the password spray attack. Cybercriminals use a small set of common passwords and try them across many accounts to find one that matches.<\/p>\n<p class=\"ai-optimize-13\">This approach differs from brute force attacks, where many passwords are tried on a single account, which can trigger account lockouts. Spray attacks are more subtle and can often bypass these lockout protections, making them a serious threat.<\/p>\n<p class=\"ai-optimize-14\">Addressing the challenge of implementing strong password practices throughout an organization, we launched a new detection called M365 Password Spray. Adding further heft to our brute force detection suite, this alert is designed to identify suspicious incidents involving a large number of accounts with login failures originating from a single external IP address.<\/p>\n<p class=\"ai-optimize-15\">The detection logic is based on monitoring authentication attempts. If an unusually high number of accounts receive failed logins from a single IP address, an alert is triggered. Should a successful login occur as well, the alert severity is increased, indicating that the attack may have succeeded.<\/p>\n<p class=\"ai-optimize-16\">This upgrade to the brute force detection suite exemplifies our commitment to continually improve threat detection on the platform. Below is a sample alert:<\/p>\n<\/div>\n<\/section>\n<div class=\"hr hr-invisible avia-builder-el-12 el_after_av_textblock el_before_av_image \"><span class=\"hr-inner \"><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div class=\"avia-image-container av-styling- avia-builder-el-13 el_after_av_hr el_before_av_hr avia-align-center\">\n<div class=\"avia-image-container-inner\">\n<div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class=\"avia_image\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png\" alt=\"\" title=\"Brute_Force_Detection_Blog_Image\" height=\"299\" width=\"469\" \/><\/div>\n<\/div>\n<\/div>\n<div class=\"hr hr-invisible avia-builder-el-14 el_after_av_image el_before_av_textblock \"><span class=\"hr-inner \"><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p class=\"ai-optimize-17\">The graphic showcases the following detection highlights:<\/p>\n<ul>\n<li class=\"ai-optimize-18\">Severity: Low if no successful logon in addition to failures. Medium if there was a successful logon along with the slew of failures.<\/li>\n<li class=\"ai-optimize-19\">Source IP Address: The detection shows which external IP was responsible for the suspicious activity.<\/li>\n<li class=\"ai-optimize-20\">User ID: The names of the individual accounts are listed here.<\/li>\n<li class=\"ai-optimize-21\">Additional Information: Shows the number of accounts with failed access in a single hour, along with additional details about the login failures.<\/li>\n<li class=\"ai-optimize-22\">Events Table: Shows the individual events that were aggregated by the model.<\/li>\n<\/ul>\n<p class=\"ai-optimize-23\">These detection trends highlight just how widespread and often unnoticed password spray attacks can be, reinforcing the need for continuous monitoring, smarter authentication controls, and rapid response capabilities.<\/p>\n<h2 class=\"ai-optimize-24\">Beyond the Alert: What Comes Next<\/h2>\n<p class=\"ai-optimize-25\">Whether it\u2019s a suspected credential compromise, unusual user behavior, or a flagged password spray attempt, once an alert reaches the portal, there is a timely and structured response that is critical to minimizing risk. In this section, we\u2019ll walk through the recommended remediation sequence, from initial triage to containment, investigation, and recovery ensuring you can act quickly, confidently, and effectively. Below is a recommended remediation sequence in case a Password Spray alert is delivered to the portal:<\/p>\n<h3 class=\"ai-optimize-26\"><strong>Containment and Immediate Response<\/strong><\/h3>\n<ul>\n<li class=\"ai-optimize-27\">Block the offending IP address at Microsoft 365 level (Conditional Access, Defender) and network firewalls.<\/li>\n<li class=\"ai-optimize-28\">Temporarily disable or restrict access to targeted user accounts to prevent further exploitation.<\/li>\n<li class=\"ai-optimize-29\">Force password resets and invalidate active sessions or tokens for affected users.<\/li>\n<\/ul>\n<h3 class=\"ai-optimize-30\"><strong>Investigation and Analysis<\/strong><\/h3>\n<ul>\n<li class=\"ai-optimize-31\">Analyze user activities for signs of account compromise, such as mailbox rule changes or unusual behavior.<\/li>\n<li class=\"ai-optimize-32\">Check if MFA was enabled and enforced and identify any bypass attempts.<\/li>\n<\/ul>\n<h3 class=\"ai-optimize-33\"><strong>Hardening<\/strong><\/h3>\n<ul>\n<li class=\"ai-optimize-34\">Reset passwords and re-enable MFA for affected users.<\/li>\n<li class=\"ai-optimize-35\">Remove any malicious inbox rules, delegations, or unauthorized app consents.<\/li>\n<li class=\"ai-optimize-36\">Adjust account lockout and smart lockout policies to better defend against future spray attempts.<\/li>\n<li class=\"ai-optimize-37\">Implement or refine Conditional Access policies, including geo-blocking and risk-based access controls.<\/li>\n<\/ul>\n<p class=\"ai-optimize-38\">Effective remediation isn\u2019t just about resolving a single alert\u2014it\u2019s about breaking the attack chain and strengthening your overall security posture. By following a consistent, well-documented response process within the platform, teams can reduce dwell time, limit business impact, and turn every incident into an opportunity to improve resilience. Staying prepared, responsive, and proactive is key to keeping evolving threats in check.<\/p>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Protect your organization from password spray attacks. Discover how smart detection tools and strong password practices boost your cybersecurity defense.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70273","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able\" \/>\n<meta property=\"og:description\" content=\"Protect your organization from password spray attacks. Discover how smart detection tools and strong password practices boost your cybersecurity defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T17:49:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:29:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_UnravellingCyberDefenseModelSecrets-PasswordSprayDetections.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Unravelling Cyber Defense Model Secrets: Password Spray Detections\",\"datePublished\":\"2025-03-27T17:49:34+00:00\",\"dateModified\":\"2025-08-28T09:29:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\"},\"wordCount\":774,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png\",\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\",\"name\":\"Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png\",\"datePublished\":\"2025-03-27T17:49:34+00:00\",\"dateModified\":\"2025-08-28T09:29:51+00:00\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage\",\"url\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png\",\"contentUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections","og_locale":"it_IT","og_type":"article","og_title":"Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able","og_description":"Protect your organization from password spray attacks. Discover how smart detection tools and strong password practices boost your cybersecurity defense.","og_url":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-03-27T17:49:34+00:00","article_modified_time":"2025-08-28T09:29:51+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_UnravellingCyberDefenseModelSecrets-PasswordSprayDetections.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Unravelling Cyber Defense Model Secrets: Password Spray Detections","datePublished":"2025-03-27T17:49:34+00:00","dateModified":"2025-08-28T09:29:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections"},"wordCount":774,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png","inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections","url":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections","name":"Unravelling Cyber Defense Model Secrets: Password Spray Detections - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png","datePublished":"2025-03-27T17:49:34+00:00","dateModified":"2025-08-28T09:29:51+00:00","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/unravelling-cyber-defense-model-secrets-password-spray-detections#primaryimage","url":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png","contentUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Brute_Force_Detection_Blog_Image.png"},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/70273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=70273"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/70273\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=70273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}