{"id":1482,"date":"2021-11-11T10:36:46","date_gmt":"2021-11-11T10:36:46","guid":{"rendered":"https:\/\/arzhost.com\/blogs\/?p=1482"},"modified":"2025-09-02T13:33:42","modified_gmt":"2025-09-02T08:33:42","slug":"naxsi-vs-mod-security","status":"publish","type":"post","link":"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/","title":{"rendered":"Naxsi vs Mod Security: Best Web Application Firewall?"},"content":{"rendered":"<p>Mod Security adds ca half be reducing popular total dealing with. Mod Security (with for all intents and purposes no standards) is speedier than Modified (Naxsi with Common Hacks\/Rules) ca 30%. Changed Naxsi with ca 4k standards (blacklist), equivalent plan to Mod Security is ca 98% all the more inactive.<\/p>\n<p>That is the explanation, most Web Hosts need to engage <a href=\"https:\/\/en.wikipedia.org\/wiki\/Firewall_(computing)\" target=\"_blank\" rel=\"noopener\">firewall<\/a> programs like Mod Security, NAXSI, etc to watch these server hacks. \u201cNaxsi vs Mod Security\u201d, Yet both of them are free, the choice of Naxsi versus Mod Security depends by and large upon the server plan.<\/p>\n<p>Around here at <span style=\"color: #00ff00;\"><a style=\"color: #00ff00;\" href=\"https:\/\/www.arzhost.com\/\"><strong>ARZHOST<\/strong><\/a><\/span>, we help server owners to pick and plan these web claim firewall programs as a part of our Maintenance Services for Web Hosts. Today, \u201cNaxsi vs Mod Security\u201d, what about we look at the benefits and disservices of NAXSI and Mod Security.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_74 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#NAXSI_%E2%80%93_What_is_it_and_Why\" >NAXSI \u2013 What is it and Why?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Specialists_of_NAXSI\" >Specialists of NAXSI<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#1_Direct_standard_set\" >1. Direct standard set<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#2_Supports_Whitelist\" >2. Supports Whitelist<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#3_Impenetrable_to_WAF_evade_techniques\" >3. Impenetrable to WAF evade techniques<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#4_Fast_and_easy_to_stay_aware_of\" >4. Fast and easy to stay aware of<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Scams_of_NAXSI\" >Scams of NAXSI<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#2_Kind_of_Webserver\" >2. Kind of Webserver<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#People_Also_Ask\" >People Also Ask<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Mod_Security_%E2%80%93_What_is_it_and_Why\" >Mod Security \u2013 What is it and Why?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Specialists_of_Mod_Security\" >Specialists of Mod Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#1_Squares_ordinary_attacks\" >1. Squares ordinary attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#2_Supports_Virtual_fixing\" >2. Supports Virtual fixing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#3_High_Customization\" >3. High Customization<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Scams_of_Mod_Security\" >Scams of Mod Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#1_Extreme_to_stay_aware_of_the_ruleset\" >1. Extreme to stay aware of the ruleset<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#2_Higher_resource_use\" >2. Higher resource use<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/arzhost.com\/blogs\/naxsi-vs-mod-security\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"NAXSI_%E2%80%93_What_is_it_and_Why\"><\/span><strong>NAXSI \u2013 What is it and Why? <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Nginx Anti-XSS and SQL Injection (NAXSI) is a web application firewall that is expressly planned for Nginx servers.<\/p>\n<p>Taxi helps with engaging against aggressors that add powerless substance on the site. Additionally, \u201cNaxsi vs Mod Security\u201d, gives a method of avoiding code mixtures to the informational index used by the locations.<\/p>\n<p>By and by, let us have a close-by look at the huge potential gains and disadvantages of NAXSI.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Specialists_of_NAXSI\"><\/span><strong><u>Specialists of NAXSI <\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u201cNaxsi vs Mod Security\u201d, The huge benefits of NAXSI include:<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_Direct_standard_set\"><\/span><strong>1. Direct standard set <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>NAXSI protects destinations with an essential standard set that uses a score-based system. It scores every URL interest with a score. Right when this score is more noticeable than the breaking point regard set in the game plan, NAXSI subsequently obstructs the site interest.<\/p>\n<p>On the off chance that the sales URL contains possible malignant characters like &#8220;&lt;\u201c, \/[slash], or drop, that normally increase the score. \u201c<span style=\"color: #000000;\"><strong>Naxsi vs Mod Security<\/strong><\/span>\u201d, Additionally, such URLs are upset from executing on the server.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Supports_Whitelist\"><\/span><strong>2. Supports Whitelist <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is a strange benefit that NAXSI grants to make a lot of whitelist rules. These standards say that particular malignant model matches in picked applications are okay and NAXSI licenses them.<\/p>\n<p>To make things more direct, NAXSI goes with an instrument called Nxtool. This device thusly gains from the site traffic and makes the whitelist. Additionally, if over 20% of your customers have the same set-off factor in their site requests, it will be recorded as genuine. \u201cNaxsi vs Mod Security\u201d, All such requests go through the webserver.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"3_Impenetrable_to_WAF_evade_techniques\"><\/span><strong>3. Impenetrable to WAF evade techniques <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Exactly when the firewall rules became serious, software causes have found substitute methods of bypassing them. Regardless, NAXSI manages possible diversion techniques like encoding the URL, \u201cNaxsi vs Mod Security\u201d, the connection of strings in the requesting, etc<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_Fast_and_easy_to_stay_aware_of\"><\/span><strong>4. Fast and easy to stay aware of <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>NAXSI doesn&#8217;t eat up a huge piece of server resources. In like manner, it needn&#8217;t waste time with any irregular updates as in Mod Security. \u201cNaxsi vs Mod Security\u201d, Once presented, it works constantly without any trip.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Scams_of_NAXSI\"><\/span><strong><u>Scams of NAXSI <\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Disregarding the way that there are many benefits, \u201cNaxsi vs Mod Security\u201d, NAXSI goes with its disadvantages as well.<\/p>\n<h2><\/h2>\n<p>NAXSI has 2 modes, Live and Learning. It is in the learning mode that NAXSI makes the whitelist rules. Thusly, whenever there is an update in the site code, we need to run NAXSI in learning mode and change rules to allow real traffic.<\/p>\n<p><a href=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI.jpg\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-12502\" title=\"scams of NAXSI\" src=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI-300x157.jpg\" alt=\"scams of NAXSI\" width=\"300\" height=\"157\" srcset=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI-300x157.jpg 300w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI-1024x536.jpg 1024w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI-768x402.jpg 768w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI-848x440.jpg 848w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/scams-of-NAXSI.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Subsequently, \u201cNaxsi vs Mod Security\u201d, makes an overhead especially when there are constant code changes in the site.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Kind_of_Webserver\"><\/span><strong>2. Kind of Webserver <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There is a critical disadvantage that NAXSI is fitting only for Nginx systems. It will not work for Apache or IIS. Thusly, it, by and large, restricts the decisions available for the kind of web server.<\/p>\n<p>From our association with directing servers, we see that NAXSI works mind-boggling in Docker-based applications. In like manner, \u201cNaxsi vs Mod Security\u201d, our Hosting Expert Planners regularly propose and set up NAXSI for applications like Own cloud, Elastic search, etc.<\/p>\n<hr \/>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"People_Also_Ask\"><\/span><strong>People Also Ask<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Question # 1: How good is ModSecurity?<\/strong><\/p>\n<p>Answer: ModSecurity is\u00a0a very helpful and cooperative tool even for beginners. It is very easy to apprehend and use. Review collected by and hosted on G2.com.<\/p>\n<p><strong>Question # 2: Do I need Mod_Security?<\/strong><\/p>\n<p>Answer: For eCommerce purposes, ModSecurity is an essential piece of PCI DSS compliance, helping satisfy Requirement 6.6 by helping shield your site against external threats. Therefore, we strongly advise against disabling or uninstalling the module.<\/p>\n<p><strong>Question # 3: Should I disable Mod_Security?<\/strong><\/p>\n<p>Answer: We will not recommend disabling Mod-Security on your account. Mod_security module helps to protect your website from various attacks. If mod-security is disabled on your account, your website will be at risk from vulnerabilities.<\/p>\n<p><strong>Question # 4: Is AWS WAF ModSecurity?<\/strong><\/p>\n<p>Answer: So let&#8217;s dive into how we&#8217;re accomplishing this further with ModSecurity and AWS WAF. ModSecurity is\u00a0one of the most popular WAF (web application firewalls) available. ModSecurity has existed for Apache for a long time and the newer libmodsecurity 3. x is bringing that functionality to Nginx.<\/p>\n<p><strong>Question # 5: What is better Apache or Nginx?<\/strong><\/p>\n<p>Answer: NGINX performs 2.5 times faster than Apache according to a benchmark test performed by running up to 1,000 simultaneous connections. Another benchmark running with 512 simultaneous connections, showed that NGINX is about twice as fast and consumed less memory.<\/p>\n<hr \/>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Mod_Security_%E2%80%93_What_is_it_and_Why\"><\/span><strong>Mod Security \u2013 What is it and Why? <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mod Security is one of the well-known web application firewalls that supports web servers like Apache, IIS, Nginx, etc. \u201cNaxsi vs Mod Security\u201d, keeps a library of harmful models, in any case, called Signatures. Exactly when the requesting URL facilitates with any of the imprints, they are hindered.<\/p>\n<p><a href=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why.jpg\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-12504\" title=\"mod security what is it and why\" src=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why-300x157.jpg\" alt=\"mod security what is it and why\" width=\"300\" height=\"157\" srcset=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why-300x157.jpg 300w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why-1024x536.jpg 1024w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why-768x402.jpg 768w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why-848x440.jpg 848w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2025\/09\/mod-security-what-is-it-and-why.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Specialists_of_Mod_Security\"><\/span><strong><u>Specialists of Mod Security <\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u201cNaxsi vs Mod Security\u201d, Mod Security goes with specialists like:<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_Squares_ordinary_attacks\"><\/span><strong>1. Squares ordinary attacks <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mod Security goes with a Core Ruleset that arrangements with for all intents and purposes known attacks the web. So there is no additional need to create rules to block most certainly known frail applications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Supports_Virtual_fixing\"><\/span><strong>2. Supports Virtual fixing <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Moreover, Mod Security gives the decision of &#8220;Virtual Patching&#8221;. Virtual fixing helps with preventing an undertaking in the server due to a recently discovered shortcoming.<\/p>\n<p>All things considered, \u201cNaxsi vs Mod Security\u201d, when there is another WordPress or PHP-based attack, you essentially need to fix your Mod Security application for a brief reason. That prevents further locales attacks using this shortcoming. In like manner, you get greater freedom to revive each powerless WordPress site.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"3_High_Customization\"><\/span><strong>3. High Customization <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Furthermore, \u201cNaxsi vs Mod Security\u201d, Mod Security licenses to form unequivocal principles for the applications worked with on the server. It gives space for custom changes when there is some particular kind of attacks that are by and large fundamental for your applications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Scams_of_Mod_Security\"><\/span><strong><u>Scams of Mod Security <\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u201cNaxsi vs Mod Security\u201d, Again Mod Security has its piece of cons also.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_Extreme_to_stay_aware_of_the_ruleset\"><\/span><strong>1. Extreme to stay aware of the ruleset <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>All Mod Security rules are essentially standard verbalizations, which can be hard to stay aware of. Moreover, \u201cNaxsi vs Mod Security\u201d, when there is an unreasonable number of rules, it transforms into a veritable test to allow incredible traffic and square the malignant attacks.<\/p>\n<p>Our Hosting Expert Planners consistently get helpdesk requests from customers where Mod Security hinders genuine requests too.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Higher_resource_use\"><\/span><strong>2. Higher resource use <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mod Security much of the time shows high resource use when there are countless standards organized. \u201cNaxsi vs Mod Security\u201d, the Higher the number of destinations running on the server, the higher will be the resource use on the server. So the choice depends upon the server specifics also.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With suitable performance and mindful tuning, web applications firewalls like Mod Security and NAXSI essentially help to avoid possible web waiter hacks. Today, \u201cNaxsi vs Mod Security\u201d, we&#8217;ve seen the relative assessment that helps our Hosting Expert Planners to pick Mod Security or NAXSI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mod Security adds ca half be reducing popular total dealing with. Mod Security (with for all intents and purposes no standards) is speedier than Modified (Naxsi with Common Hacks\/Rules) ca 30%. Changed Naxsi with ca 4k standards (blacklist), equivalent plan to Mod Security is ca 98% all the more inactive. That is the explanation, most [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7194,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,25,14,17,26,16],"tags":[],"table_tags":[],"class_list":["post-1482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hosting","category-knowledge","category-news","category-security","category-server","category-tutorial"],"_links":{"self":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/1482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/comments?post=1482"}],"version-history":[{"count":5,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/1482\/revisions"}],"predecessor-version":[{"id":12505,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/1482\/revisions\/12505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/media\/7194"}],"wp:attachment":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/media?parent=1482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/categories?post=1482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/tags?post=1482"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/table_tags?post=1482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}