{"id":11897,"date":"2020-11-25T00:12:35","date_gmt":"2020-11-25T00:12:35","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11897"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"annual-iot-security-report-2019-6","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/annual-iot-security-report-2019-6\/","title":{"rendered":"Annual IoT Security Report 2019-6"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Identification of IoT Assets from Known IPv6 Addresses<\/h2>\n\n\n\n<p>The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To work around these problems, we based our recon on some available IPv6 addresses, in a bid to discover IoT assets operating in IPv6 environments. Sources of these addresses include Hitlist27, which maintains about 3 million IPv6 addresses, and NSFOCUS Threat Intelligence (NTI), which provides a collection of about 1.7 billion IPv6 addresses extracted from domain name intelligence. Note that the IPv6 addresses available for our recon are but a very small portion of the total number. Besides, IoT assets found active in IPv6 environments were rather small in number.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>We limited our scope of recon to these IPv6 addresses and, by scanning ports commonly used by IoT assets, found about 80,000 IPv6 IoT assets, whose types are shown in the following figure. Of all IPv6 IoT assets discovered, VoIP phones took up the largest proportion, standing at 70,682, followed by cameras (13,960) and routers (1549).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"552\" height=\"374\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-1-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11899\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-1-1.jpg 552w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-1-1-300x203.jpg 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/figure><\/div>\n\n\n\n<p>As for port distribution of IPv6 IoT assets, port 5060 opened for VoIP and port 554 opened for cameras were most frequently seen in our scanning results, as shown in Figure 2-11. As for global distribution of IPv6 IoT assets, Germany topped the list with the most IPv6 IoT assets, followed by the Netherlands and the USA, as shown in Figure 2-12.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"568\" height=\"742\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11901\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-2-1.jpg 568w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1125-2-1-230x300.jpg 230w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/figure><\/div>\n\n\n\n<p>Although it is very difficult to perform a full scan of IPv6 assets, that does not mean that we cannot do the recon at all. An idea is to narrow down the scope of IPv6 addresses and adopt heuristic approaches to, for example, identify IPv6 addresses based on their characteristics and identify dual-stack IoT assets via the UPnP service. Sections 2.4.3 Heuristic Recon of IPv6 Addresses Based on Their Characteristics and 2.4.4 Heuristic Recon via the Dual-Stack UPnP Service detail the two methods.<\/p>\n\n\n\n<p>To be continued.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Identification of IoT Assets from Known IPv6 Addresses The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To work around these problems, we based our recon on some available IPv6 addresses, in a bid to discover IoT assets operating in IPv6 environments. Sources of these addresses include Hitlist27, which [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5,15],"tags":[470],"class_list":["post-11897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","category-research-reports","tag-iot-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Annual IoT Security Report 2019-6 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annual IoT Security Report 2019-6 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Identification of IoT Assets from Known IPv6 Addresses The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-25T00:12:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Annual IoT Security Report 2019-6 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Identification of IoT Assets from Known IPv6 Addresses The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Annual IoT Security Report 2019-6\",\"datePublished\":\"2020-11-25T00:12:35+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/\"},\"wordCount\":312,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"keywords\":[\"IoT Security\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/\",\"name\":\"Annual IoT Security Report 2019-6 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"datePublished\":\"2020-11-25T00:12:35+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"width\":426,\"height\":289,\"caption\":\"IoT botnets\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Annual IoT Security Report 2019-6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual IoT Security Report 2019-6 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/","og_locale":"pt_BR","og_type":"article","og_title":"Annual IoT Security Report 2019-6 - NSFOCUS","og_description":"Identification of IoT Assets from Known IPv6 Addresses The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To","og_url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/","og_site_name":"NSFOCUS","article_published_time":"2020-11-25T00:12:35+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Annual IoT Security Report 2019-6 - NSFOCUS","twitter_description":"Identification of IoT Assets from Known IPv6 Addresses The preceding section gives a brief account of difficulties in the blind-scan of IPv6 addresses. To","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Annual IoT Security Report 2019-6","datePublished":"2020-11-25T00:12:35+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/"},"wordCount":312,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","keywords":["IoT Security"],"articleSection":["Blog","DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/","url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/","name":"Annual IoT Security Report 2019-6 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","datePublished":"2020-11-25T00:12:35+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","width":426,"height":289,"caption":"IoT botnets"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Annual IoT Security Report 2019-6"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11897"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11897\/revisions"}],"predecessor-version":[{"id":32707,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11897\/revisions\/32707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/11865"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}