{"id":7817,"date":"2022-01-25T00:00:00","date_gmt":"2022-01-25T08:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends"},"modified":"2025-06-18T05:14:33","modified_gmt":"2025-06-18T12:14:33","slug":"azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/","title":{"rendered":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><em>This blog post was co-authored by Anupam Vij, Principal PM Manager, and Syed Pasha, Principal Network Engineer, Azure Networking<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the second half of 2021, the world experienced an unprecedented level of Distributed Denial-of-Service (DDoS) activity in both complexity and frequency. The gaming industry was perhaps the hardest hit, with DDoS attacks disrupting gameplay of Blizzard games<sup>1<\/sup>, Titanfall<sup>2<\/sup>, Escape from Tarkov<sup>3<\/sup>, Dead by Daylight<sup>4<\/sup>, and Final Fantasy 14<sup>5<\/sup> among many others. Voice over IP (VoIP) service providers such as Bandwidth.com<sup>6<\/sup>, VoIP Unlimited<sup>7<\/sup>, and VoIP.ms<sup>8<\/sup> suffered outages following ransom DDoS attacks. In India, we saw a 30-fold increase of DDoS attacks during the nation\u2019s festive season in October<sup>9<\/sup> with multiple broadband providers targeted, which shows that the holidays are indeed an attractive time for cybercriminals. As we highlighted in the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report\">2021 Microsoft Digital Defense Report<\/a>, the availability of DDoS for-hire services as well as the cheap costs\u2014at only approximately $300 USD per month\u2014make it extremely easy for anyone to conduct targeted DDoS attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, despite the evolving challenges in the cyber landscape, the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection\/\">Azure DDoS Protection<\/a> team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"august-recorded-the-highest-number-of-attacks\">August recorded the highest number of attacks<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft mitigated an average of 1,955 attacks per day, a 40 percent increase from the <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q1-and-q2-ddos-attack-trends\/\">first half of 2021<\/a>. The maximum number of attacks in a day recorded was 4,296 attacks on August 10, 2021. In total, we mitigated upwards of 359,713 unique attacks against our global infrastructure during the second half of 2021, a 43 percent increase from the first half of 2021.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Interestingly, there was not as much of a concentration of attacks during the end-of-year holiday season compared to previous years. We saw more attacks in Q3 than in Q4, with the most occurring in August, which may indicate a shift towards attackers acting all year round\u2014no longer is <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\">holiday season the proverbial DDoS season<\/a>! This highlights the importance of DDoS protection all year round, and not just during peak traffic seasons.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\" alt=\"A line chart showing the number of D D o S attacks from July 2021 to January 2022.\" title=\"Number of DDoS attacks\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-mitigated-a-3-47-tbps-attack-and-two-more-attacks-above-2-5-tbps\">Microsoft mitigated a 3.47 Tbps attack, and two more attacks above 2.5 Tbps<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Last October, Microsoft reported on a <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/business-as-usual-for-azure-customers-despite-24-tbps-ddos-attack\/\">2.4 terabit per second (Tbps) DDoS attack<\/a> in Azure that we successfully mitigated. Since then, we have mitigated three larger attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This was a distributed attack originating from approximately 10,000 sources and from multiple countries across the globe, including the United States, China, South Korea, Russia, Thailand, India, Vietnam, Iran, Indonesia, and Taiwan. Attack vectors were UDP reflection on port 80 using Simple Service Discovery Protocol (SSDP), Connection-less Lightweight Directory Access Protocol (CLDAP), Domain Name System (DNS), and Network Time Protocol (NTP) comprising one single peak, and the overall attack lasted approximately 15 minutes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/703f34e2-0a7a-434c-bf5d-34b8b72ecf0c.webp\" alt=\"A line chart showing how a three point four seven T b p s D D o S attack was mitigated within two minutes.\" title=\"3.5 Tbps DDoS attack mitigated\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In December, we mitigated two more attacks that surpassed 2.5 Tbps, both of which were again in Asia. One was a 3.25 Tbps UDP attack in Asia on ports 80 and 443, spanning more than 15 minutes with four main peaks, the first at 3.25 Tbps, the second at 2.54 Tbps, the third at 0.59 Tbps, and the fourth at 1.25 Tbps. The other attack was a 2.55 Tbps UDP flood on port 443 with one single peak, and the overall attack lasted just a bit over five minutes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/19e46207-54a6-4c1f-b6d1-894db96c65e4.webp\" alt=\"A line chart showing how a three point two five T b p s D D o S attack was mitigated within less than fifteen minutes.\" title=\"3.25 Tbps DDoS attack mitigated\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/3e5bd7b1-af2d-41d0-9cee-dc86f75eea37.webp\" alt=\"A line chart showing how a two point five five T b p s D D o S attack was mitigated within two minutes.\" title=\"2.55 Tbps DDoS attack mitigated\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In these cases, our customers do not have to worry about how to protect their workloads in Azure, as opposed to running them on-premises. Azure\u2019s DDoS protection platform, built on distributed DDoS detection and mitigation pipelines, can scale enormously to absorb the highest volume of DDoS attacks, providing our customers the level of protection they need. The service employs fast detection and mitigation of large attacks by continuously monitoring our infrastructure at many points across the Microsoft global network. Traffic is scrubbed at the Azure network edge before it can impact the availability of services. If we identify that the attack volume is significant, we leverage the global scale of Azure to defend the attack from where it is originating.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"short-burst-and-multi-vector-attacks-remain-prevalent-although-more-attacks-are-lasting-longer\">Short burst and multi-vector attacks remain prevalent, although more attacks are lasting longer<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As with the first half of 2021, most attacks were short-lived, although, in the second half of 2021, the proportion of attacks that were 30 minutes or less dropped from 74 percent to 57 percent. We saw a rise in attacks that lasted longer than an hour, with the composition more than doubling from 13 percent to 27 percent. Multi-vector attacks continue to remain prevalent.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It\u2019s important to note that for longer attacks, each attack is typically experienced by customers as a sequence of multiple short, repeated burst attacks. One such example would be the 3.25 Tbps attack mitigated, which was the aggregation of four consecutive short-lived bursts that each ramped up in seconds to terabit volumes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/1bd3f167-3b2c-4481-af6a-988985444718.webp\" alt=\"A line bar chart showing attack duration breakdown between hours and minutes from Q 3 and Q4 verses Q1 and Q 2.\" title=\"Attack duration breakdown\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"udp-spoof-floods-dominated-targeting-the-gaming-industry\">UDP spoof floods dominated, targeting the gaming industry<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">UDP attacks rose to the top vector in the second half of 2021, comprising 55 percent of all attacks, a 16 percent increase from the first half of 2021. Meanwhile, TCP attacks decreased from 54 percent to just 19 percent. UDP spoof floods was the most common attack type (55 percent), followed by TCP ACK floods (14 percent) and DNS amplification (6 percent).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/76086dbb-8780-4204-b283-0399c3bf1caa.webp\" alt=\"A pie chart showing the breakdown of attack vectors distribution.\" title=\"Attack vectors distribution\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Gaming continues to be the hardest hit industry. The gaming industry has always been rife with DDoS attacks because players often go to great lengths to win. Nevertheless, we see that a wider range of industries are just as susceptible, as we have observed an increase in attacks in other industries such as financial institutions, media, internet service providers (ISPs), retail, and supply chain. Particularly during the holidays, ISPs provide critical services that power internet phone services, online gaming, and media streaming, which make them an attractive target for attackers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">UDP is commonly used in gaming and streaming applications. The majority of attacks on the gaming industry have been mutations of the Mirai botnet and low-volume UDP protocol attacks. An overwhelming majority were UDP spoof floods, while a small portion were UDP reflection and amplification attacks, mostly SSDP, Memcached, and NTP.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Workloads that are highly sensitive to latency, such as multiplayer game servers, cannot tolerate such short burst UDP attacks. Outages of just a couple seconds can impact competitive matches, and outages lasting more than 10 seconds typically will end a match. For this scenario, Azure recently released the preview of <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protect-workloads-with-inline-ddos-protection-from-gateway-load-balancer-partners\/\" target=\"_blank\" rel=\"noopener\">inline DDoS protection<\/a>, offered through partner network virtual appliances (NVAs) that are deployed with Azure Gateway Load Balancer. This solution can be tuned to the specific shape of the traffic and can mitigate attacks instantaneously without impacting the availability or performance of highly latency-sensitive applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"huge-increase-in-ddos-attacks-in-india-east-asia-remains-popular-with-attackers\">Huge increase in DDoS attacks in India, East Asia remains popular with attackers<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The United States remains the top attacked destination (54 percent). We saw a sharp uptick in attacks in India, from just 2 percent of all attacks in the first half of 2021 to taking the second position at twenty-three percent of all attacks in the second half of 2021. East Asia (Hong Kong) remains a popular hotspot for attackers (8 percent). Interestingly, relative to other regions, we saw a decrease in DDoS activity in Europe, dropping from 19 percent in the first half of 2021 to 6 percent in the second half.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/d5170478-37b3-418b-97b1-fab78d61baaf.webp\" alt=\"A pie chart showing attack destinations breakdown with the United States at the top at fifty four percent.\" title=\"Attack destinations breakdown\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The concentration of attacks in Asia can be largely explained by the huge gaming footprint<sup>10<\/sup>, especially in China, Japan, South Korea, Hong Kong, and India, which will continue to grow as the increasing smartphone penetration drives the popularity of mobile gaming in Asia. In India, another driving factor may be that the acceleration of digital transformation, for example, the \u201cDigital India\u201d initiative<sup>11<\/sup>, has increased the region\u2019s overall exposure to cyber risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"defended-against-new-attack-vectors\">Defended against new attack vectors<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">During the October-to-December holiday season, we defended against new TCP PUSH-ACK flood attacks that were dominant in the East Asia region, namely in Hong Kong, South Korea, and Japan. We observed a new TCP option manipulation technique used by attackers to dump large payloads, whereby in this attack variation, the TCP option length is longer than the option header itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This attack was automatically mitigated by our platform\u2019s advanced packet anomaly detection and mitigation logic, with no intervention required and no customer impact at all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"protect-your-workloads-from-ddos-attacks-with-microsoft\">Protect your workloads from DDoS attacks with Microsoft<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As the world moves towards a new era of digitalization with the expansion of 5G and IoT, and with more industries embracing online strategies, the increased online global footprint means that the threat of cyberattacks will continue to grow. As we have witnessed that DDoS attacks are now rampant even during non-festive periods, it is crucial for businesses to develop a robust <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/ddos-response-strategy\" target=\"_blank\" rel=\"noopener\">DDoS response strategy<\/a> all year round, and not just during the holiday season.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection\/\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection<\/a> team protects every property in Microsoft and the entire Azure infrastructure. Our vision is to protect all internet-facing workloads in Azure, against all known DDoS attacks across all levels of the network stack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"combine-ddos-protection-standard-with-application-gateway-web-application-firewall-for-comprehensive-protection\">Combine DDoS Protection Standard with Application Gateway Web Application Firewall for comprehensive protection<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When combined with DDoS Protection Standard, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/web-application-firewall\/\">Application Gateway web application firewall (WAF)<\/a>, or a third-party web application firewall deployed in a virtual network with a public IP, provides comprehensive protection for L3-L7 attacks on web and API assets. This also works if you are using Azure Front Door alongside Application Gateway WAF, or if your <a href=\"https:\/\/docs.microsoft.com\/azure\/azure-vmware\/protect-azure-vmware-solution-with-application-gateway\">backend resources are in your on-premises environment<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you have <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/ddos-protection\/ddos-protection-reference-architectures#paas-web-application\">PaaS web application services running<\/a> on Azure App Service or Azure SQL Database, you can host your application behind an Application Gateway and WAF and enable DDoS Protection Standard on the virtual network which contains the Application Gateway and WAF. In this scenario, the web application itself is not directly exposed to the public Internet and is protected by Application Gateway WAF and DDoS Protection Standard. To minimize any potential attack surface area, you should also configure the web application to accept only traffic from the Application Gateway public IP address and block unwanted ports.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/48700a93-2341-4653-b2f3-ed5164fa91d1.webp\" alt=\"DDoS Protection Standard with Application Gateway Web Application Firewall\" title=\"DDoS Protection Standard with Application Gateway Web Application Firewall\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"use-inline-ddos-protection-for-latency-sensitive-workloads\">Use inline DDoS protection for latency-sensitive workloads<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">If you have workloads that are highly sensitive to latency and cannot tolerate short burst DDoS attacks, we recently released the preview of <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protect-workloads-with-inline-ddos-protection-from-gateway-load-balancer-partners\/\" target=\"_blank\" rel=\"noopener\">inline DDoS protection<\/a>, offered through partner network virtual appliances (NVAs) that are deployed with Azure Gateway Load Balancer. Inline DDoS protection mitigates even short-burst low-volume DDoS attacks instantaneously without impacting the availability or performance of highly latency-sensitive applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"optimize-secops-with-azure-firewall-manager\">Optimize SecOps with Azure Firewall Manager<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">DDoS Protection Standard is automatically tuned to protect all public IP addresses in virtual networks, such as those attached to an IaaS virtual machine, Load Balancer (Classic and Standard Load Balancers), Application Gateway, and Azure Firewall Manager. In addition to Azure Firewall policy management, Azure Firewall Manager, a network security management service, now supports <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/streamline-your-ddos-management-with-new-azure-firewall-manager-capabilities\/\" target=\"_blank\" rel=\"noopener\">managing DDoS Protection Standard for your virtual networks<\/a>. Enabling DDoS Protection Standard on a virtual network will protect the Azure Firewall and any publicly exposed endpoints that reside within the virtual network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-azure-ddos-protection-standard\">Learn more about Azure DDoS Protection Standard<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022&nbsp;&nbsp;&nbsp; Azure DDoS Protection Standard <a href=\"https:\/\/azure.microsoft.com\/services\/ddos-protection\/\">product page<\/a>.<br>\u2022&nbsp;&nbsp;&nbsp; Azure DDoS Protection Standard <a href=\"https:\/\/aka.ms\/ddosprotectiondocs\">documentation<\/a>.<br>\u2022&nbsp;&nbsp;&nbsp; Azure DDoS Protection Standard <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/ddos-protection-reference-architectures\">reference architectures<\/a>.<br>\u2022&nbsp;&nbsp;&nbsp; DDoS Protection <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/fundamental-best-practices\">best practices<\/a>.<br>\u2022&nbsp;&nbsp;&nbsp; Azure DDoS <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/ddos-rapid-response\">Rapid Response<\/a>.<br>\u2022&nbsp;&nbsp;&nbsp; DDoS Protection Standard <a href=\"https:\/\/azure.microsoft.com\/pricing\/details\/ddos-protection\/\">pricing and SLA<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.digitaltrends.com\/gaming\/blizzard-hit-with-another-ddos\/\" target=\"_blank\" rel=\"noopener\"><sup>1<\/sup>Overwatch, World of Warcraft Go Down After DDoS | Digital Trends<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.pcgamer.com\/after-years-of-struggling-against-ddos-attacks-titanfall-is-being-removed-from-sale\/\" target=\"_blank\" rel=\"noopener\"><sup>2<\/sup>After years of struggling against DDoS attacks, Titanfall is being removed from sale | PC Gamer<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.nme.com\/en_asia\/news\/gaming-news\/escape-from-tarkov-suffers-sustained-server-issues-in-possible-ddos-attacks-3129154\" target=\"_blank\" rel=\"noopener\"><sup>3<\/sup>&#8216;Escape From Tarkov&#8217; suffers sustained server issues in possible DDoS attacks (nme.com)<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.eurogamer.net\/articles\/2021-11-11-dead-by-daylight-streamers-are-being-ddos-attacked\" target=\"_blank\" rel=\"noopener\"><sup>4<\/sup>Dead by Daylight streamers are being DDoS attacked<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.nme.com\/en_asia\/news\/gaming-news\/final-fantasy-14-eu-servers-affected-by-ddos-attack-3019552\" target=\"_blank\" rel=\"noopener\"><sup>5<\/sup>&#8216;Final Fantasy 14&#8217; EU servers affected by DDoS attack (nme.com)<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.zdnet.com\/article\/bandwidth-ceo-confirms-outages-caused-by-ddos-attack\/\" target=\"_blank\" rel=\"noopener\"><sup>6<\/sup>Bandwidth CEO confirms outages caused by DDoS attack | ZDNet<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.ispreview.co.uk\/index.php\/2021\/10\/ddos-attack-hits-voip-and-internet-provider-voip-unlimited-again.html\" target=\"_blank\" rel=\"noopener\"><sup>7<\/sup>DDoS Attack Hits VoIP and Internet Provider VoIP Unlimited Again UPDATE2 &#8211; ISPreview UK<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.zdnet.com\/article\/voip-company-battles-massive-ransom-ddos-attack\/\" target=\"_blank\" rel=\"noopener\"><sup>8<\/sup>VoIP company battles massive ransom DDoS attack | ZDNet<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/ahmedabadmirror.com\/30-fold-increase-in-ddos-cyber-attacks-in-india-in-festive-season\/81814494.html\" target=\"_blank\" rel=\"noopener\"><sup>9<\/sup>30-fold increase in DDoS cyber attacks in India in festive season (ahmedabadmirror.com)<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.statista.com\/topics\/2196\/video-game-industry-in-asia\/#dossierKeyfigures\" target=\"_blank\" rel=\"noopener\"><sup>10<\/sup>Gaming industry in Asia Pacific &#8211; statistics and facts | Statista<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/digitalindia.gov.in\/di-initiatives\" target=\"_blank\" rel=\"noopener\"><sup>11<\/sup>Di-Initiatives | Digital India Programme | Ministry of Electronics and Information Technology (MeitY) Government of India<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1457,1459],"tags":[],"audience":[3053,3056],"content-type":[1481],"product":[1500],"tech-community":[],"topic":[],"coauthors":[97],"class_list":["post-7817","post","type-post","status-publish","format-standard","hentry","category-networking","category-security","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-azure-ddos-protection","review-flag-1680286584-658","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-4-1680286581-250","review-flag-5-1680286581-950","review-flag-6-1680286581-909","review-flag-7-1680286581-146","review-flag-8-1680286581-263","review-flag-9-1680286581-259","review-flag-alway-1680286580-106","review-flag-infor-1680286585-108","review-flag-iot-1680286585-835","review-flag-lever-1680286579-649","review-flag-new-1680286579-546","review-flag-partn-1680286579-901","review-flag-percent","review-flag-usd-1680286585-730"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T12:14:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\" \/>\n<meta name=\"author\" content=\"Microsoft Azure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Azure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Azure\"}],\"headline\":\"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends\",\"datePublished\":\"2022-01-25T08:00:00+00:00\",\"dateModified\":\"2025-06-18T12:14:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\"},\"wordCount\":2023,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\",\"articleSection\":[\"Networking\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\",\"name\":\"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\",\"datePublished\":\"2022-01-25T08:00:00+00:00\",\"dateModified\":\"2025-06-18T12:14:33+00:00\",\"description\":\"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog","description":"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/","og_locale":"en_US","og_type":"article","og_title":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog","og_description":"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2022-01-25T08:00:00+00:00","article_modified_time":"2025-06-18T12:14:33+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp","type":"","width":"","height":""}],"author":"Microsoft Azure","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Microsoft Azure","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/","@type":"Person","@name":"Microsoft Azure"}],"headline":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends","datePublished":"2022-01-25T08:00:00+00:00","dateModified":"2025-06-18T12:14:33+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/"},"wordCount":2023,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp","articleSection":["Networking","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/","name":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp","datePublished":"2022-01-25T08:00:00+00:00","dateModified":"2025-06-18T12:14:33+00:00","description":"At Microsoft, despite the evolving challenges in the cyber landscape, the Azure DDoS Protection team was able to successfully mitigate some of the largest DDoS attacks ever, both in Azure and in the course of history. In this review, we share trends and insights into DDoS attacks we observed and mitigated throughout the second half of 2021.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/01\/68e2342a-9807-463e-9bc5-c873082ca2b6.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/"},{"@type":"ListItem","position":3,"name":"Azure DDoS Protection\u20142021 Q3 and Q4 DDoS attack trends"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=7817"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7817\/revisions"}],"predecessor-version":[{"id":42330,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7817\/revisions\/42330"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=7817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=7817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=7817"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=7817"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=7817"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=7817"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=7817"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=7817"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=7817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}