{"id":8481,"date":"2020-07-31T15:07:13","date_gmt":"2020-07-31T12:07:13","guid":{"rendered":"https:\/\/top.host\/blog\/?p=8481"},"modified":"2020-07-31T15:07:13","modified_gmt":"2020-07-31T12:07:13","slug":"tophost-firewall-based-reputation-system","status":"publish","type":"post","link":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/","title":{"rendered":"Find out how Top.Host protects your website against malicious attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">When you buy a hosting plan from Top.Host, you are basically &#8220;renting out&#8221; space on one of our servers. This server contains all of your website&#8217;s important data (passwords, customer information, content). The server is your website&#8217;s &#8220;home&#8221; and, like any other home, it must be secured for its owner to enjoy. Firewall Based Reputation System is here in order to take care of that!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security is our priority so we have just created a new tool. In this blog post we will explain how it works, what it does and which are the tool&#8217;s advantages. We will also give you an insight on how malicious attacks work and how we protect you from them.<\/span><\/p>\n<h3>From Bitninja to Firewall Based Reputation System<\/h3>\n<p><span style=\"font-weight: 400;\">\u039fur customers host their ideas, businesses and online presence \u03bfn our servers. You can imagine that the issue of server security is not new &#8211; it has been concerning us from day 1 of our operation. <\/span><span style=\"font-weight: 400;\">For many years, the hard task of our servers protection from malicious attacks was undertaken by the Bitninja cloud service. It is one of the most popular protection softwares and has largely covered our needs for several years. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, as our clientele grew so did our needs. We needed more and we could not get it unless we went to a custom-made solution designed by ourselves. <\/span><span style=\"font-weight: 400;\">Creating our own tool, exactly tailored to fit our needs, was the only way! That&#8217;s how Firewall Based Reputation System arrived!<\/span><\/p>\n<h3>The new tool!<\/h3>\n<p><span style=\"font-weight: 400;\">So our infrastructure team focused on this great task. Having the know-how and experience, the team designed and created its own Firewall Based Reputation System: it detects an IP as suspect by using the following methods:<\/span><\/p>\n<ul>\n<li>Brute Force attacks on<br \/>\nEmail<br \/>\nFTP<br \/>\nWebmail<br \/>\nPlesk Control Panel<\/li>\n<li>Website login forms (WordPress, Joomla, Drupal, PrestaShop and more)<\/li>\n<li>Attacks on websites with security gaps and not updated applications<\/li>\n<li>Attacks on forms such as contact\/ subscription\/ password reminder for Spam<\/li>\n<\/ul>\n<p>This malicious IP is then blocked by the attacked server which forwards the information to the central Firerwall Based Reputation System. All Top.Host servers block the IP out so that it is no longer a threat.<\/p>\n<p>This system ends up fortifying our customers against:<\/p>\n<ul>\n<li>DDOS attacks on Web service<\/li>\n<li>Spam<\/li>\n<li>CMS hacking (website infection)<\/li>\n<li>Spying on passwords through the email service and in the Plesk Control Panel<\/li>\n<\/ul>\n<p>The following image shows an IP blocking graph per service.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8487 size-full\" src=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1.png\" alt=\"Firewall Based Reputation System 1\" width=\"1594\" height=\"612\" srcset=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1.png 1594w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1-300x115.png 300w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1-1000x384.png 1000w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1-768x295.png 768w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.57.13-PM-1-1536x590.png 1536w\" sizes=\"auto, (max-width: 1594px) 100vw, 1594px\" \/><\/p>\n<p>Top.Host customers are protected from day one thanks to this tool. There is no extra charge for that and there is no need to to anything\u00a0 in order to to activate this function. It is enabled by default on the servers provided by Top.Host!<\/p>\n<h3>Interesting facts gathered from the Firewall Based Reputation System<\/h3>\n<p>You can imagine that in order to create such a tool we had to invest time and resources. However, the attempted and stopped attacks are not few. Everyday there are way too many attacks attempted and motives behind them vary. But without a doubt they are also financial motives. The Firewall Based Reputation System has offered some impressive insights that highlight not only the importance of fortification but also the size of the problem.<\/p>\n<h3>Approximately 230,000 attacks a month<\/h3>\n<p>As you can see from the picture, the attempted attacks are thousands every day. Our tool manages to block them!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8489 size-full\" src=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1.png\" alt=\"Firewall Based Reputation System 2\" width=\"1588\" height=\"614\" srcset=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1.png 1588w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1-300x116.png 300w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1-1000x387.png 1000w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1-768x297.png 768w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-2020-07-26-at-1.40.53-PM-1-1536x594.png 1536w\" sizes=\"auto, (max-width: 1588px) 100vw, 1588px\" \/><\/p>\n<h3>Monthly server breach attempts<\/h3>\n<p>Here is an example of attempted breaches on a single server, over a period of one month. It &#8216;s really impressive.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8490 size-full\" src=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-28-59-1.png\" alt=\"Firewall Based Reputation System 3\" width=\"1187\" height=\"315\" srcset=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-28-59-1.png 1187w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-28-59-1-300x80.png 300w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-28-59-1-1000x265.png 1000w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-28-59-1-768x204.png 768w\" sizes=\"auto, (max-width: 1187px) 100vw, 1187px\" \/><\/p>\n<h3>Geographical data<\/h3>\n<p>Most attempts are made from China and the United States!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8491 size-full aligncenter\" src=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-31-02-1.png\" alt=\"Firewall Based Reputation System 4\" width=\"1190\" height=\"341\" srcset=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-31-02-1.png 1190w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-31-02-1-300x86.png 300w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-31-02-1-1000x287.png 1000w, https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/Screenshot-from-2020-07-26-14-31-02-1-768x220.png 768w\" sizes=\"auto, (max-width: 1190px) 100vw, 1190px\" \/><\/p>\n<p>Whatever the reason is for anyone on the planet to attack a server, we are here to prevent it. The new tool is just one part of our effort towards this direction!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you buy a hosting plan from Top.Host, you are basically &#8220;renting out&#8221; space on&hellip;<\/p>\n","protected":false},"author":35,"featured_media":8457,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mc4wp_mailchimp_campaign":[],"footnotes":""},"categories":[2430],"tags":[],"coauthors":[3636],"class_list":["post-8481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Find out how Top.Host protects your website against malicious attacks - Top.Host Blog<\/title>\n<meta name=\"description\" content=\"We combined our know-how and expertise and we created Top.Host&#039;s Firewall Based Reputation System. Find out more about it!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Find out how Top.Host protects your website against malicious attacks\" \/>\n<meta property=\"og:description\" content=\"We combined our know-how and expertise and we created Top.Host&#039;s Firewall Based Reputation System. Find out more about it!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Top.Host Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tophostGR\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T12:07:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Top.Host Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:site\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Top.Host Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/\"},\"author\":{\"name\":\"Top.Host Team\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/b1ae8b156388fa9422d1cf380b8e8b6b\"},\"headline\":\"Find out how Top.Host protects your website against malicious attacks\",\"datePublished\":\"2020-07-31T12:07:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/\"},\"wordCount\":635,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/BlogimageTophostOxyrwsiGR.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/\",\"name\":\"Find out how Top.Host protects your website against malicious attacks - Top.Host Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/BlogimageTophostOxyrwsiGR.jpg\",\"datePublished\":\"2020-07-31T12:07:13+00:00\",\"description\":\"We combined our know-how and expertise and we created Top.Host's Firewall Based Reputation System. Find out more about it!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/BlogimageTophostOxyrwsiGR.jpg\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/BlogimageTophostOxyrwsiGR.jpg\",\"width\":700,\"height\":466,\"caption\":\"\u039f\u03c7\u03cd\u03c1\u03c9\u03c3\u03b7 site\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/tophost-firewall-based-reputation-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/top.host\\\/blog\\\/el\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Find out how Top.Host protects your website against malicious attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"name\":\"Top.Host Blog\",\"description\":\"Extreme Support\",\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/top.host\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\",\"name\":\"Top.Host\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Top.Host\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tophostGR\\\/\",\"https:\\\/\\\/x.com\\\/TophostExtreme\",\"https:\\\/\\\/www.instagram.com\\\/tophostgr\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/752527\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/TophostXtremeSupport\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/b1ae8b156388fa9422d1cf380b8e8b6b\",\"name\":\"Top.Host Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/top.hostteam-140x140.png9b119feb43464789841084f6c38c91c1\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/top.hostteam-140x140.png\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/top.hostteam-140x140.png\",\"caption\":\"Top.Host Team\"},\"description\":\"The Top.Host team writes and shares useful articles!\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/author\\\/tophost-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Find out how Top.Host protects your website against malicious attacks - Top.Host Blog","description":"We combined our know-how and expertise and we created Top.Host's Firewall Based Reputation System. Find out more about it!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/","og_locale":"en_US","og_type":"article","og_title":"Find out how Top.Host protects your website against malicious attacks","og_description":"We combined our know-how and expertise and we created Top.Host's Firewall Based Reputation System. Find out more about it!","og_url":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/","og_site_name":"Top.Host Blog","article_publisher":"https:\/\/www.facebook.com\/tophostGR\/","article_published_time":"2020-07-31T12:07:13+00:00","og_image":[{"width":700,"height":466,"url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg","type":"image\/jpeg"}],"author":"Top.Host Team","twitter_card":"summary_large_image","twitter_creator":"@TophostExtreme","twitter_site":"@TophostExtreme","twitter_misc":{"Written by":"Top.Host Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#article","isPartOf":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/"},"author":{"name":"Top.Host Team","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/b1ae8b156388fa9422d1cf380b8e8b6b"},"headline":"Find out how Top.Host protects your website against malicious attacks","datePublished":"2020-07-31T12:07:13+00:00","mainEntityOfPage":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/"},"wordCount":635,"commentCount":0,"publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"image":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/","url":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/","name":"Find out how Top.Host protects your website against malicious attacks - Top.Host Blog","isPartOf":{"@id":"https:\/\/top.host\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#primaryimage"},"image":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg","datePublished":"2020-07-31T12:07:13+00:00","description":"We combined our know-how and expertise and we created Top.Host's Firewall Based Reputation System. Find out more about it!","breadcrumb":{"@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#primaryimage","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/BlogimageTophostOxyrwsiGR.jpg","width":700,"height":466,"caption":"\u039f\u03c7\u03cd\u03c1\u03c9\u03c3\u03b7 site"},{"@type":"BreadcrumbList","@id":"https:\/\/top.host\/blog\/tophost-firewall-based-reputation-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/top.host\/blog\/el\/"},{"@type":"ListItem","position":2,"name":"Find out how Top.Host protects your website against malicious attacks"}]},{"@type":"WebSite","@id":"https:\/\/top.host\/blog\/#website","url":"https:\/\/top.host\/blog\/","name":"Top.Host Blog","description":"Extreme Support","publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/top.host\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/top.host\/blog\/#organization","name":"Top.Host","url":"https:\/\/top.host\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","width":300,"height":300,"caption":"Top.Host"},"image":{"@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tophostGR\/","https:\/\/x.com\/TophostExtreme","https:\/\/www.instagram.com\/tophostgr\/","https:\/\/www.linkedin.com\/company\/752527\/","https:\/\/www.youtube.com\/user\/TophostXtremeSupport"]},{"@type":"Person","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/b1ae8b156388fa9422d1cf380b8e8b6b","name":"Top.Host Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/top.hostteam-140x140.png9b119feb43464789841084f6c38c91c1","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/top.hostteam-140x140.png","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/07\/top.hostteam-140x140.png","caption":"Top.Host Team"},"description":"The Top.Host team writes and shares useful articles!","url":"https:\/\/top.host\/blog\/author\/tophost-team\/"}]}},"_links":{"self":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/comments?post=8481"}],"version-history":[{"count":13,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8481\/revisions"}],"predecessor-version":[{"id":8498,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8481\/revisions\/8498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media\/8457"}],"wp:attachment":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media?parent=8481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/categories?post=8481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/tags?post=8481"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/coauthors?post=8481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}