{"id":2948,"date":"2026-05-07T01:14:10","date_gmt":"2026-05-07T01:14:10","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/"},"modified":"2026-05-07T01:14:10","modified_gmt":"2026-05-07T01:14:10","slug":"an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/","title":{"rendered":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)"},"content":{"rendered":"<div>\n<p>[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu <a href=\"https:\/\/www.sans.edu\/cyber-security-programs\/bachelors-degree\/\">BACS<\/a> program]<\/p>\n<p>Through the expansion of Large Language Models (LLMs), cybersecurity has exploded with a variety of tools for both offensive and defensive purposes. A majority of software and cyber tools are integrating Artificial Intelligence (AI) solutions into their applications, largely in the form of chatbots, automation tools through Model Context Protocol (MCP), or ingestion to prompt response type interfaces.<\/p>\n<p>An overlooked and underestimated aspect of AI that is slowly arising is the creation of bespoke user interfaces (UI). That is simply put \u2014 a UI that is created custom fit to the specific needs and data provided impromptu from the user. With the ability for these models to ingest large amounts of data, it can orchestrate the appropriate elements for a UI that will be tailored to the ingested dataset.<\/p>\n<p>Rather than the user having to adjust their queries or layouts for the logs that they are analyzing, the LLM will determine the proper UI elements to give to the user. This allows the user to focus on analyzing rather than tool setup.<\/p>\n<p>Over days of web traffic on the <a href=\"https:\/\/isc.sans.edu\/tools\/honeypot\/\">DShield<\/a> webhoneypot, there are large variations of intent behind the interactions. Some days, some actors may focus only on scanning and recon. Other days may be heavy on stealing credentials or trying to get a web shell exploit.<\/p>\n<p>As a regular user would try to identify patterns then use their discretion to find the next proper &#8216;<span style=\"font-family:Courier New,Courier,monospace;\">grep<\/span>&#8216;, &#8216;<span style=\"font-family:Courier New,Courier,monospace;\">jq<\/span>&#8216;, or other similar pattern recognizing POSIX tools, the LLM does the same.<\/p>\n<p>Before this type of bespoke UIs in cyber analytics, analysts would have to spend extensive time and energy to understand what to look for and how to use the appropriate tools. With LLM&#8217;s able to do this heavy lifting, more analysts will be able to recognize attacks on their web servers with little to no cyber experience.<\/p>\n<p>When developers have to manage feature implementations, documentation updates, meetings (which are always productive of course&#8230;), and dreaded bugs &#8211; security and active monitoring become an afterthought. To make the internet a safer place, we have to lower the barrier to entry for recognizing web attacks.<\/p>\n<p>Okay enough selling you on how much potential this has, let&#8217;s talk about how it actually works.<\/p>\n<p>It works like this: the system reads your DShield web honeypot log file, then a Python analyzer goes through the entries and turns them into a clean summary of what happened instead of dumping raw attacker text into the AI. That summary includes things like top IPs, top URLs, time patterns, and tags for probe\/attack types such as WordPress probes, SSRF, path traversal, CGI abuse, and other recognizable patterns. Then Claude looks at the cleaned summary and writes a React dashboard component that fits the shape of the attack activity for that day, so the UI can change depending on whether the logs are mostly one big campaign or a mix of background internet noise.<\/p>\n<p>The safe part is that the LLM never gets the raw malicious strings directly, and the generated UI never gets to run loose in the main page. Instead, the app serves the generated dashboard through a backend API, caches it so it does not constantly change, and renders it inside a sandboxed iframe. If the generated code is broken, the system validates it and falls back to a static dashboard. So the whole flow is basically: logs came in -&gt; analyzer summarizes them -&gt; Claude generates a matching UI -&gt; frontend loads it safely and pulls chart data from the backend.<\/p>\n<p>Let&#8217;s take a look at some examples now! On days where there is more noise we do not see any dominant patterns highlighted on the UI<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\" style=\"width: 634px; height: 610px;\"><\/p>\n<p>However, on days where there is a clear pattern from certain actors we see an immediate highlight\u2026<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic2.png\" style=\"width: 624px; height: 631px;\"><\/p>\n<p>Furthermore, it is able to recognize and highlight attack signatures that were most obvious (or would be obvious to an experienced analyst) at the very top of the UI\u2019s dashboard<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic3.png\" style=\"width: 624px; height: 791px;\"><\/p>\n<p>There are sometimes some interesting quirks like the LLM creating a dashboard with light mode instead of dark mode.<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic4.png\" style=\"width: 624px; height: 792px;\"><\/p>\n<p>Nonetheless it is interesting to see how the LLM adapts to each day\u2019s attack logs. I imagine if I could \u201cvibe code\u201d this idea in a few hours, it could become a full-blown platform and toolkit for major organizations and analysts. So yea\u2026I didn\u2019t write the code for all this madness, I simply took a problem that I constantly face when looking at attack logs &#8211; what is it that I\u2019m actually looking for? And created a unique bespoke UI for each day\u2019s scenario.<\/p>\n<p>Shout out to Claude Code for agentically writing the repo which can be found <a href=\"http:\/\/https\/\/github.com\/gnarcoding\/bespoke-ui-cyber-analytics\/\">here<\/a>.<\/p>\n<p>Shout out to ChatGPT for helping me write the \u2018how it works\u2019 section of this blog.<\/p>\n<p>And a special shout out to my Internship mentor <a href=\"https:\/\/isc.sans.edu\/handler_list.html#guy-bruneau\">Guy Bruneau<\/a> for helping me think bigger in terms of recognizing interesting attacks on my webhoneypot.<\/p>\n<p>Be sure to subscribe to my youtube channel for more edgy tech content and cyber insights.<br \/>\nyoutube.com\/@gnarcoding<\/p>\n<p>[1] https:\/\/github.com\/gnarcoding\/bespoke-ui-cyber-analytics\/<br \/>\n[2] https:\/\/isc.sans.edu\/tools\/honeypot\/<br \/>\n[3] https:\/\/www.sans.edu\/cyber-security-programs\/bachelors-degree\/<\/p>\n<p>&#8212;&#8212;&#8212;&#8211;<br \/>\nGuy Bruneau <a href=\"http:\/\/www.ipss.ca\/\">IPSS Inc.<\/a><br \/>\n<a href=\"https:\/\/github.com\/bruneaug\/\">My GitHub Page<\/a><br \/>\nTwitter: <a href=\"https:\/\/twitter.com\/guybruneau\">GuyBruneau<\/a><br \/>\ngbruneau at isc dot sans dot edu<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program] Through the expansion of Large Language Models (LLMs), cybersecurity has exploded with a variety of tools for both offensive and defensive purposes. A majority of software and cyber tools are integrating Artificial Intelligence (AI) solutions into their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-2948","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program] Through the expansion of Large Language Models (LLMs), cybersecurity has exploded with a variety of tools for both offensive and defensive purposes. A majority of software and cyber tools are integrating Artificial Intelligence (AI) solutions into their [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-07T01:14:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)\",\"datePublished\":\"2026-05-07T01:14:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\"},\"wordCount\":930,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\",\"name\":\"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\",\"datePublished\":\"2026-05-07T01:14:10+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage\",\"url\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\",\"contentUrl\":\"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/","og_locale":"en_US","og_type":"article","og_title":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited","og_description":"[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program] Through the expansion of Large Language Models (LLMs), cybersecurity has exploded with a variety of tools for both offensive and defensive purposes. A majority of software and cyber tools are integrating Artificial Intelligence (AI) solutions into their [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-07T01:14:10+00:00","og_image":[{"url":"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)","datePublished":"2026-05-07T01:14:10+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/"},"wordCount":930,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/","name":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage"},"thumbnailUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png","datePublished":"2026-05-07T01:14:10+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#primaryimage","url":"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png","contentUrl":"https:\/\/isc.sans.edu\/diaryimages\/images\/Eric_Roldan_pic1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/07\/an-adaptive-cyber-analytics-ui-for-web-honeypot-logs-guest-diary-wed-may-6th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2948"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2948\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}