{"id":5454,"date":"2024-10-24T17:05:01","date_gmt":"2024-10-24T14:05:01","guid":{"rendered":"https:\/\/unihost.com\/blog\/?p=5454"},"modified":"2026-03-18T13:37:10","modified_gmt":"2026-03-18T11:37:10","slug":"node-defence","status":"publish","type":"post","link":"https:\/\/unihost.com\/blog\/node-defence\/","title":{"rendered":"Node Defence"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Blockchain nodes are literally the most important component of the blockchain network. It is responsible for all the information and software that performs control actions. Since they are so important, it makes sense that hackers would target them, making node protection a top priority. In this article we at Unihost would like to share best practices for protecting nodes, how and who attacks them and give tips on how to save them.<\/span><\/p>\n<h3><b>General<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Nodes form the backbone (core) of a decentralised network that runs on different projects and infrastructures. These can be cloud, on-premises or hybrid structures. These nodes take an active part in the operation of the network, playing a fundamental role in the creation and execution of transactions. With the help of nodes, a so-called \u2018consensus\u2019 is reached that validates transactions and thereby ensures the integrity of the blockchain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each transaction is protected by a unique fingerprint associated with each block, which protects them from counterfeiting. Nodes play a key role in supporting \u2018consensus\u2019 and blockchain activity.<\/span><\/p>\n<h3><strong>Attack vectors against nodes<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Nodes can be attacked from a variety of angles, including those listed in the OWASP list of top 10 web applications.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples include misconfigurations that result in significant losses, such as the theft of more than $20 million worth of Ethereum due to misconfigured wallets.<\/span><\/p>\n<p><strong>DDoS<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Denial of service attacks aim to disable blockchain nodes, which can lead to network instability. Also, DDoS attacks in the form of a huge number of transactions, as the Solana incident showed us, can overload nodes, leading to network failures and instability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Fraudulent transactions<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Blockchains, very easily succumb to such attacks that exploit weaknesses in the software. Fraudulent transactions can create a disruption in the node or, in the worst case, give fraudsters control over the node.\u00a0<\/span><\/p>\n<p><strong>Dangerous software<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Nodes are at risk of being infected with malicious software that aims to steal private keys, address spoofing, traffic filtering, and cryptocurrency mining using the victim&#8217;s resources.\u00a0<\/span><\/p>\n<p><strong>51% attack<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Another variant of the node attack where fraudsters gain control over 51% of the mining capabilities and can interrupt genuine transactions, make fraudulent transactions, and even rewrite part of the entire chain.\u00a0<\/span><\/p>\n<p><strong>Routing attacks\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">By exploiting vulnerabilities in routing protocols, fraudsters intercept data and interfere with consensus on the blockchain network.\u00a0<\/span><\/p>\n<h3><strong>How do you protect your node?\u00a0<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Naturally you should stick to traditional cybersecurity practices, which will significantly reduce the possibility of an attack on you.\u00a0<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Regularly update your software and check your configurations for possible vulnerabilities.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use antivirus to detect and interrupt the use of harmful software.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use a brandmauer.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Choose consensus algorithms such as proof-of-stake or proof-of-work to protect against specific attacks.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Control the mining pool. And redirect miners if limits are exceeded.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use secure routing protocols, verify smart contracts.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Conduct regular penetration tests and security audits.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Practice API security. Use standard TLS.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Monitor the health of nodes and the entire infrastructure. Use dedicated servers and reliable providers.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Adhere to a secure software development lifecycle. And securely store private keys.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Don&#8217;t place sensitive data in public repositories.\u00a0<\/span><\/li>\n<\/ol>\n<h3><span style=\"font-weight: 400;\"><strong>Overall<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Blockchain network security depends not only on the underlying infrastructure, but also on the clear and constant application of cybersecurity rules. Constant monitoring, testing and adherence to cybersecurity protocols will keep you out of the hands of fraudsters. Unihost in turn are ready to provide you with the best software to protect your servers, technicians to respond 24\/7 and full maintenance services.<\/span><\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-5454\" data-postid=\"5454\" class=\"themify_builder_content themify_builder_content-5454 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_jvii172 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_0fdn172 first\">\n                    <!-- module template_part -->\n<div  class=\"module module-layout-part tb_pu95845 \">\n    <\/div>\n<!-- \/module template_part -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Blockchain nodes are literally the most important component of the blockchain network. It is responsible for all the information and software that performs control actions. Since they are so important, it makes sense that hackers would target them, making node protection a top priority. In this article we at Unihost would like to share best [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":5467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":["post-5454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Node Defence - Unihost.com Blog<\/title>\n<meta name=\"description\" content=\"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/blog\/node-defence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Node Defence - Unihost.com Blog\" \/>\n<meta property=\"og:description\" content=\"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/blog\/node-defence\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-24T14:05:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T11:37:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"34\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex Shevchuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Shevchuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/\"},\"author\":{\"name\":\"Alex Shevchuk\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\"},\"headline\":\"Node Defence\",\"datePublished\":\"2024-10-24T14:05:01+00:00\",\"dateModified\":\"2026-03-18T11:37:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg\",\"articleSection\":[\"Crypto\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/\",\"url\":\"https:\/\/unihost.com\/blog\/node-defence\/\",\"name\":\"Node Defence - Unihost.com Blog\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg\",\"datePublished\":\"2024-10-24T14:05:01+00:00\",\"dateModified\":\"2026-03-18T11:37:10+00:00\",\"description\":\"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/blog\/node-defence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg\",\"width\":1160,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/blog\/node-defence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/unihost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Node Defence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/blog\/#website\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"name\":\"Unihost.com Blog\",\"description\":\"Web hosting, Online marketing and Web News\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/blog\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\",\"https:\/\/x.com\/unihost\",\"https:\/\/instagram.com\/unihost\",\"https:\/\/www.linkedin.com\/company\/unihost-com\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\",\"name\":\"Alex Shevchuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"caption\":\"Alex Shevchuk\"},\"description\":\"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/\",\"url\":\"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Node Defence - Unihost.com Blog","description":"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/blog\/node-defence\/","og_locale":"en_US","og_type":"article","og_title":"Node Defence - Unihost.com Blog","og_description":"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.","og_url":"https:\/\/unihost.com\/blog\/node-defence\/","og_site_name":"Unihost.com Blog","article_publisher":"https:\/\/www.facebook.com\/unihost","article_published_time":"2024-10-24T14:05:01+00:00","article_modified_time":"2026-03-18T11:37:10+00:00","og_image":[{"width":200,"height":34,"url":"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png","type":"image\/png"}],"author":"Alex Shevchuk","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Alex Shevchuk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/blog\/node-defence\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/"},"author":{"name":"Alex Shevchuk","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474"},"headline":"Node Defence","datePublished":"2024-10-24T14:05:01+00:00","dateModified":"2026-03-18T11:37:10+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/"},"wordCount":568,"publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"image":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg","articleSection":["Crypto"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/blog\/node-defence\/","url":"https:\/\/unihost.com\/blog\/node-defence\/","name":"Node Defence - Unihost.com Blog","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage"},"image":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg","datePublished":"2024-10-24T14:05:01+00:00","dateModified":"2026-03-18T11:37:10+00:00","description":"Best practices for protecting blockchain nodes, how and who attacks them and give tips on how to save them.","breadcrumb":{"@id":"https:\/\/unihost.com\/blog\/node-defence\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/blog\/node-defence\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/node-defence\/#primaryimage","url":"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2024\/10\/new-war.svg","width":1160,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/blog\/node-defence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/unihost.com\/blog\/"},{"@type":"ListItem","position":3,"name":"Node Defence"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/blog\/#website","url":"https:\/\/unihost.com\/blog\/","name":"Unihost.com Blog","description":"Web hosting, Online marketing and Web News","publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/blog\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost","https:\/\/x.com\/unihost","https:\/\/instagram.com\/unihost","https:\/\/www.linkedin.com\/company\/unihost-com"]},{"@type":"Person","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474","name":"Alex Shevchuk","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","caption":"Alex Shevchuk"},"description":"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/","url":"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/comments?post=5454"}],"version-history":[{"count":13,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5454\/revisions"}],"predecessor-version":[{"id":5514,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5454\/revisions\/5514"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media\/5467"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media?parent=5454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/categories?post=5454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/tags?post=5454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}