{"id":178,"date":"2024-09-02T08:35:00","date_gmt":"2024-09-02T03:05:00","guid":{"rendered":"https:\/\/hackzone.in\/blog\/?p=178"},"modified":"2024-10-20T19:39:35","modified_gmt":"2024-10-20T14:09:35","slug":"blocking-malicious-ips-using-suricata-a-step-by-step-guide","status":"publish","type":"post","link":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/","title":{"rendered":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Table_of_Contents\" >Table of Contents<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Introduction_to_Suricata_and_IP_Blocking\" >Introduction to Suricata and IP Blocking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Why_Block_Malicious_IPs_%F0%9F%A4%94\" >Why Block Malicious IPs? \ud83e\udd14<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Setting_Up_Suricata_for_IP_Blocking\" >Setting Up Suricata for IP Blocking<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Installation\" >Installation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Configuring_Suricata\" >Configuring Suricata<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Creating_Rules_to_Block_Malicious_IPs\" >Creating Rules to Block Malicious IPs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Testing_and_Verifying_IP_Blocking\" >Testing and Verifying IP Blocking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Monitoring_and_Updating_IP_Lists\" >Monitoring and Updating IP Lists<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#Conclusion_Stay_Ahead_of_the_Threats_%F0%9F%9A%80\" >Conclusion: Stay Ahead of the Threats \ud83d\ude80<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Table_of_Contents\"><\/span>Table of Contents<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"#introduction-to-suricata-and-ip-blocking\">Introduction to Suricata and IP Blocking<\/a><\/li>\n\n\n\n<li><a href=\"#why-block-malicious-ips-\">Why Block Malicious IPs? \ud83e\udd14<\/a><\/li>\n\n\n\n<li><a href=\"#setting-up-suricata-for-ip-blocking\">Setting Up Suricata for IP Blocking<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"#installation\">Installation<\/a><\/li>\n\n\n\n<li><a href=\"#configuring-suricata\">Configuring Suricata<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"#creating-rules-to-block-malicious-ips\">Creating Rules to Block Malicious IPs<\/a><\/li>\n\n\n\n<li><a href=\"#testing-and-verifying-ip-blocking\">Testing and Verifying IP Blocking<\/a><\/li>\n\n\n\n<li><a href=\"#monitoring-and-updating-ip-lists\">Monitoring and Updating IP Lists<\/a><\/li>\n\n\n\n<li><a href=\"#conclusion-stay-ahead-of-the-threats-\">Conclusion: Stay Ahead of the Threats \ud83d\ude80<\/a><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction_to_Suricata_and_IP_Blocking\"><\/span>Introduction to Suricata and IP Blocking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In the ever-evolving landscape of cybersecurity, proactive measures are essential to safeguard your network from malicious activities. Suricata, an open-source network threat detection engine, is a powerful tool in your security arsenal. In this guide, we&#8217;ll dive into how to block malicious IPs using Suricata, helping you fortify your network against potential threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Block_Malicious_IPs_%F0%9F%A4%94\"><\/span>Why Block Malicious IPs? \ud83e\udd14<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Blocking malicious IPs is a critical component of network security. Malicious IPs are often associated with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Brute force attacks<\/strong> \ud83d\udd13<\/li>\n\n\n\n<li><strong>Phishing campaigns<\/strong> \ud83c\udfa3<\/li>\n\n\n\n<li><strong>Malware distribution<\/strong> \ud83e\udda0<\/li>\n\n\n\n<li><strong>DDoS attacks<\/strong> \ud83d\udeab<\/li>\n<\/ul>\n\n\n\n<p>By blocking these IPs, you reduce the risk of unauthorized access and data breaches, ensuring your network remains secure and your data protected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Setting_Up_Suricata_for_IP_Blocking\"><\/span>Setting Up Suricata for IP Blocking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Installation\"><\/span>Installation<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Before you can start blocking malicious IPs, you need to have Suricata installed. Here\u2019s a quick guide to get you started:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"sudo apt-get update\nsudo apt-get install suricata\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">sudo<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">apt-get<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">update<\/span><\/span>\n<span class=\"line\"><span style=\"color: #DCDCAA\">sudo<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">apt-get<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">install<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">suricata<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Once installed, you can check the version to ensure everything is up-to-date:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"suricata -V\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">suricata<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #569CD6\">-V<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Configuring_Suricata\"><\/span>Configuring Suricata<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>After installation, you&#8217;ll need to configure Suricata to enable IP blocking. Open the configuration file (usually located at <strong><code>\/etc\/suricata\/suricata.yaml<\/code>):<\/strong><\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"sudo nano \/etc\/suricata\/suricata.yaml\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">sudo<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">nano<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">\/etc\/suricata\/suricata.yaml<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Within this file, you&#8217;ll want to ensure that the <code>drop<\/code> and <code>reject<\/code> actions are properly configured to handle malicious IPs effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Creating_Rules_to_Block_Malicious_IPs\"><\/span>Creating Rules to Block Malicious IPs<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Suricata uses rules to detect and respond to network threats. To block a specific IP address, you can create a custom rule. For example, to block the IP <code>192.168.1.100<\/code>, add the following rule to your custom rules file <strong>(e.g., <code>\/etc\/suricata\/rules\/local.rules<\/code>):<\/strong><\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"drop ip any any -&gt; 192.168.1.100 any (msg:&quot;Blocked Malicious IP&quot;; sid:1000001; rev:1;)\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">drop<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">ip<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">any<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">any<\/span><span style=\"color: #D4D4D4\"> -&gt; <\/span><span style=\"color: #B5CEA8\">192.168<\/span><span style=\"color: #CE9178\">.1.100<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">any<\/span><span style=\"color: #D4D4D4\"> (msg:<\/span><span style=\"color: #CE9178\">&quot;Blocked Malicious IP&quot;<\/span><span style=\"color: #D4D4D4\">; <\/span><span style=\"color: #DCDCAA\">sid:1000001<\/span><span style=\"color: #D4D4D4\">; <\/span><span style=\"color: #DCDCAA\">rev:1<\/span><span style=\"color: #D4D4D4\">;)<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>This rule tells Suricata to drop all traffic to and from the specified IP, effectively blocking it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Testing_and_Verifying_IP_Blocking\"><\/span>Testing and Verifying IP Blocking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>After creating your rules, it&#8217;s essential to test and verify that Suricata is correctly blocking the malicious IPs. You can do this by:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Restarting <strong>Suricata<\/strong> to apply the new rules:<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"sudo systemctl restart suricata\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">sudo<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">systemctl<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">restart<\/span><span style=\"color: #D4D4D4\"> <\/span><span style=\"color: #CE9178\">suricata<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Generating traffic to the blocked IP and observing Suricata&#8217;s logs to ensure the traffic is being dropped.<\/li>\n<\/ol>\n\n\n\n<p>Logs can be checked at:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" data-code=\"\/var\/log\/suricata\/fast.log\" style=\"color:#D4D4D4;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M4.5 12.75l6 6 9-13.5\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M16.5 8.25V6a2.25 2.25 0 00-2.25-2.25H6A2.25 2.25 0 003.75 6v8.25A2.25 2.25 0 006 16.5h2.25m8.25-8.25H18a2.25 2.25 0 012.25 2.25V18A2.25 2.25 0 0118 20.25h-7.5A2.25 2.25 0 018.25 18v-1.5m8.25-8.25h-6a2.25 2.25 0 00-2.25 2.25v6\"><\/path><\/svg><\/span><pre class=\"shiki dark-plus\" style=\"background-color: #1E1E1E\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #DCDCAA\">\/var\/log\/suricata\/fast.log<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Look for entries that indicate the rule has been triggered and the IP has been blocked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Monitoring_and_Updating_IP_Lists\"><\/span>Monitoring and Updating IP Lists<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Blocking malicious IPs isn&#8217;t a one-time task. Threat actors are constantly evolving, so it&#8217;s crucial to regularly update your IP blocklist. You can automate this process by integrating Suricata with a threat intelligence feed that provides up-to-date information on malicious IPs.<\/p>\n\n\n\n<p>Suricata supports various types of IP lists, which can be configured in your <code>suricata.yaml<\/code> file. Make sure to regularly check your logs and adjust your rules as needed to stay ahead of emerging threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion_Stay_Ahead_of_the_Threats_%F0%9F%9A%80\"><\/span>Conclusion: Stay Ahead of the Threats \ud83d\ude80<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Blocking malicious IPs with Suricata is a straightforward yet highly effective way to bolster your network&#8217;s defenses. By following the steps outlined in this guide, you can proactively protect your systems from a wide range of cyber threats. Remember, cybersecurity is an ongoing process\u2014stay vigilant, keep your rules up to date, and continue to monitor your network for any signs of malicious activity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Ready to take your network security to the next level?<\/strong> Start using Suricata today and keep those malicious IPs at bay! \ud83d\udcaa<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents Introduction to Suricata and IP Blocking In the ever-evolving landscape of cybersecurity, proactive measures are essential to safeguard your network from malicious activities. Suricata, an open-source network threat detection engine, is a powerful tool in your security arsenal. In this guide, we&#8217;ll dive into how to block malicious IPs using Suricata, helping [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[29,185,184,20,18,186],"class_list":["post-178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-intrusion-detection","tag-ip-blocking","tag-network-security","tag-suricata","tag-threat-prevention"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog\" \/>\n<meta property=\"og:description\" content=\"Table of Contents Introduction to Suricata and IP Blocking In the ever-evolving landscape of cybersecurity, proactive measures are essential to safeguard your network from malicious activities. Suricata, an open-source network threat detection engine, is a powerful tool in your security arsenal. In this guide, we&#8217;ll dive into how to block malicious IPs using Suricata, helping [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Hackzone Cyber Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hackzone.in\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T03:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-20T14:09:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Hack Zone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hack Zone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/\"},\"author\":{\"name\":\"Hack Zone\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/person\\\/21baa23c7ede39c1a491da2e47566bce\"},\"headline\":\"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide\",\"datePublished\":\"2024-09-02T03:05:00+00:00\",\"dateModified\":\"2024-10-20T14:09:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Blocking-Malicious-IPs-Using-Suricata-1.webp\",\"keywords\":[\"Cybersecurity\",\"Intrusion Detection\",\"IP Blocking\",\"Network Security\",\"Suricata\",\"Threat Prevention\"],\"articleSection\":[\"CyberSecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/\",\"name\":\"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Blocking-Malicious-IPs-Using-Suricata-1.webp\",\"datePublished\":\"2024-09-02T03:05:00+00:00\",\"dateModified\":\"2024-10-20T14:09:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Blocking-Malicious-IPs-Using-Suricata-1.webp\",\"contentUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Blocking-Malicious-IPs-Using-Suricata-1.webp\",\"width\":1024,\"height\":1024,\"caption\":\"Blocking-Malicious-IPs-Using-Suricata\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\",\"name\":\"Hackzone Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\",\"name\":\"Hackzone Cyber Security\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logo-light.png\",\"contentUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logo-light.png\",\"width\":438,\"height\":142,\"caption\":\"Hackzone Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hackzone.in\",\"https:\\\/\\\/www.instagram.com\\\/hackzone_in\\\/\",\"https:\\\/\\\/wa.me\\\/918700832498\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/person\\\/21baa23c7ede39c1a491da2e47566bce\",\"name\":\"Hack Zone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"caption\":\"Hack Zone\"},\"sameAs\":[\"http:\\\/\\\/hackzone.in\\\/blog\"],\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/author\\\/abdulsamad\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/","og_locale":"en_US","og_type":"article","og_title":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog","og_description":"Table of Contents Introduction to Suricata and IP Blocking In the ever-evolving landscape of cybersecurity, proactive measures are essential to safeguard your network from malicious activities. Suricata, an open-source network threat detection engine, is a powerful tool in your security arsenal. In this guide, we&#8217;ll dive into how to block malicious IPs using Suricata, helping [&hellip;]","og_url":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/","og_site_name":"Hackzone Cyber Security Blog","article_publisher":"https:\/\/www.facebook.com\/hackzone.in","article_published_time":"2024-09-02T03:05:00+00:00","article_modified_time":"2024-10-20T14:09:35+00:00","og_image":[{"width":1024,"height":1024,"url":"http:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp","type":"image\/webp"}],"author":"Hack Zone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hack Zone","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#article","isPartOf":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/"},"author":{"name":"Hack Zone","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/person\/21baa23c7ede39c1a491da2e47566bce"},"headline":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide","datePublished":"2024-09-02T03:05:00+00:00","dateModified":"2024-10-20T14:09:35+00:00","mainEntityOfPage":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/hackzone.in\/blog\/#organization"},"image":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp","keywords":["Cybersecurity","Intrusion Detection","IP Blocking","Network Security","Suricata","Threat Prevention"],"articleSection":["CyberSecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/","url":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/","name":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide - Hackzone Cyber Security Blog","isPartOf":{"@id":"https:\/\/hackzone.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#primaryimage"},"image":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp","datePublished":"2024-09-02T03:05:00+00:00","dateModified":"2024-10-20T14:09:35+00:00","breadcrumb":{"@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#primaryimage","url":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp","contentUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2024\/09\/Blocking-Malicious-IPs-Using-Suricata-1.webp","width":1024,"height":1024,"caption":"Blocking-Malicious-IPs-Using-Suricata"},{"@type":"BreadcrumbList","@id":"https:\/\/hackzone.in\/blog\/blocking-malicious-ips-using-suricata-a-step-by-step-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hackzone.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Blocking Malicious IPs Using Suricata: A Step-by-Step Guide"}]},{"@type":"WebSite","@id":"https:\/\/hackzone.in\/blog\/#website","url":"https:\/\/hackzone.in\/blog\/","name":"Hackzone Cyber Security","description":"","publisher":{"@id":"https:\/\/hackzone.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackzone.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hackzone.in\/blog\/#organization","name":"Hackzone Cyber Security","url":"https:\/\/hackzone.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/02\/logo-light.png","contentUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/02\/logo-light.png","width":438,"height":142,"caption":"Hackzone Cyber Security"},"image":{"@id":"https:\/\/hackzone.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hackzone.in","https:\/\/www.instagram.com\/hackzone_in\/","https:\/\/wa.me\/918700832498"]},{"@type":"Person","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/person\/21baa23c7ede39c1a491da2e47566bce","name":"Hack Zone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","caption":"Hack Zone"},"sameAs":["http:\/\/hackzone.in\/blog"],"url":"https:\/\/hackzone.in\/blog\/author\/abdulsamad\/"}]}},"_links":{"self":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":1,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":179,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions\/179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/media\/240"}],"wp:attachment":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}