{"id":19693,"date":"2023-02-01T13:31:37","date_gmt":"2023-02-01T13:31:37","guid":{"rendered":"https:\/\/news.lacnic.net\/?p=19693"},"modified":"2023-03-21T13:38:40","modified_gmt":"2023-03-21T13:38:40","slug":"estudo-do-lacnic-sobre-anti-spoofing-na-regiao","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/","title":{"rendered":"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o"},"content":{"rendered":"\n<p>Por <a href=\"https:\/\/news.lacnic.net\/autor\/graciela-martinez\">Graciela Mart\u00ednez<\/a> \u2013 L\u00edder del CSIRT LACNIC<\/p>\n\n<p>Un <a href=\"https:\/\/imasd.lacnic.net\/es\/ciberseguridad\/estudio-anti-spoofing-en-la-region\">estudio<\/a> de LACNIC sobre anti-spoofing identific\u00f3 debilidades a corregir para una correcta implementaci\u00f3n de buenas pr\u00e1cticas para mitigar el IP spoofing en redes de organizaciones de Am\u00e9rica Latina y el Caribe.<\/p>\n\n<p>El IP spoofing es la suplantaci\u00f3n de direcciones IP, refiere a la creaci\u00f3n de paquetes IP con una direcci\u00f3n IP de origen falsa, con el objetivo de hacerse pasar por otro sistema inform\u00e1tico. Mediante esa t\u00e9cnica se producen diferentes tipos de ataques inform\u00e1ticos, sumamente da\u00f1inos para la infraestructura de Internet.<\/p>\n\n<p>Esta investigaci\u00f3n busc\u00f3 mejorar los niveles de ciberseguridad de los recursos IP bajo la administraci\u00f3n de LACNIC y minimizar el posible uso de t\u00e9cnicas de IP spoofing para llevar adelante ataques tanto en la infraestructura de Internet como a las redes de los asociados de nuestra organizaci\u00f3n.<\/p>\n\n<p>Una de las claves para enfrentar la suplantaci\u00f3n de los recursos IP es la concientizaci\u00f3n y visibilizaci\u00f3n de posibles consecuencias negativas, por ello desde LACNIC brindamos estas herramientas y estudios a la comunidad a los efectos de enfrentar el problema.<\/p>\n\n<p>El trabajo de LACNIC se bas\u00f3 en datos de <a href=\"https:\/\/closedresolver.korlabs.io\" target=\"_blank\" rel=\"noreferrer noopener\">fuentes externas<\/a> y mostr\u00f3 que el porcentaje de redes vulnerables al inbound IP spoofing (tr\u00e1fico que ingresa a una red) se encuentra por debajo de 20%.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"540\" src=\"https:\/\/news.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1.png\" alt=\"\" class=\"wp-image-19680\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1-300x179.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/estudio-anti-spoofing-figure-1-768x459.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n<p>Podemos observar que Brasil, Chile, Guyana Francesa, Per\u00fa, Uruguay y Surinam son pa\u00edses que presentan menor porcentaje de redes vulnerables al inbound IP spoofing; mientras que Guyana, Paraguay y Venezuela poseen mayor porcentaje de redes vulnerables al inbound IP spoofing.<\/p>\n\n<p><strong>Recomendaciones.<\/strong> El equipo de trabajo de LACNIC analiz\u00f3 los datos y a partir de all\u00ed realiz\u00f3 una serie de acciones para que las organizaciones puedan detectar y mitigar este problema. Las recomendaciones est\u00e1n detalladas en la investigaci\u00f3n.<\/p>\n\n<p>A modo de adelanto, frente a la suplantaci\u00f3n de direcciones IP, planteamos evaluar el estado de la aplicaci\u00f3n de filtros de tipo inbound (el tr\u00e1fico que entre de Internet a una red) y outbound (el tr\u00e1fico que sale a Internet a una red) en los recursos asignados con la herramienta spoofer del proyecto <a href=\"https:\/\/www.caida.org\/projects\/spoofer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spoofer de CAIDA<\/a>.<\/p>\n\n<p>Las redes testeadas nos muestran resultados auspiciosos con una correcta implementaci\u00f3n de las buenas pr\u00e1cticas asociadas a la mitigaci\u00f3n del IP spoofing, pero a\u00fan resta analizar un porcentaje importante del universo que no est\u00e1 actuando ante este problema.<\/p>\n\n<p>Por ello consideramos importante realizar los testeos y aplicar las buenas pr\u00e1cticas recomendadas.<\/p>\n\n<p>Las estad\u00edsticas han brindado al CSIRT de LACNIC informaci\u00f3n para trabajar directamente con las organizaciones asociadas y reducir los riesgos de que los recursos asignados sean utilizados con fines maliciosos.<\/p>\n\n<p>Esperamos que este estudio sea el inicio de un camino para incrementar de forma significativa la aplicaci\u00f3n de t\u00e9cnicas anti-spoofing en las redes y, de esta manera, colaborar con la seguridad, estabilidad y resiliencia de Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Por Graciela Mart\u00ednez \u2013 L\u00edder del CSIRT LACNIC Un estudio de LACNIC sobre anti-spoofing identific\u00f3 debilidades a corregir para una correcta implementaci\u00f3n de buenas pr\u00e1cticas para mitigar el IP spoofing en redes de organizaciones de Am\u00e9rica Latina y el Caribe. El IP spoofing es la suplantaci\u00f3n de direcciones IP, refiere a la creaci\u00f3n de paquetes [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":19679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[510],"tags":[1272],"archivo":[1346],"taxonomy-authors":[1241],"tipo_autor":[],"class_list":["post-19693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-cibernetica","tag-ciberseguranca","archivo-edicoes-anteriores","taxonomy-authors-graciela-martinez-pt-br"],"acf":{"author":"","related_notes":[16722]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o\" \/>\n<meta property=\"og:description\" content=\"Por Graciela Mart\u00ednez \u2013 L\u00edder del CSIRT LACNIC Un estudio de LACNIC sobre anti-spoofing identific\u00f3 debilidades a corregir para una correcta implementaci\u00f3n de buenas pr\u00e1cticas para mitigar el IP spoofing en redes de organizaciones de Am\u00e9rica Latina y el Caribe. El IP spoofing es la suplantaci\u00f3n de direcciones IP, refiere a la creaci\u00f3n de paquetes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T13:31:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T13:38:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o\",\"datePublished\":\"2023-02-01T13:31:37+00:00\",\"dateModified\":\"2023-03-21T13:38:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\"},\"wordCount\":504,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"keywords\":[\"Ciberseguran\u00e7a\"],\"articleSection\":[\"Seguran\u00e7a cibern\u00e9tica\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\",\"url\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\",\"name\":\"LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"datePublished\":\"2023-02-01T13:31:37+00:00\",\"dateModified\":\"2023-03-21T13:38:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"LACNIC Internet Community Newsletter\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/pt-br\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/","og_locale":"pt_BR","og_type":"article","og_title":"LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o","og_description":"Por Graciela Mart\u00ednez \u2013 L\u00edder del CSIRT LACNIC Un estudio de LACNIC sobre anti-spoofing identific\u00f3 debilidades a corregir para una correcta implementaci\u00f3n de buenas pr\u00e1cticas para mitigar el IP spoofing en redes de organizaciones de Am\u00e9rica Latina y el Caribe. El IP spoofing es la suplantaci\u00f3n de direcciones IP, refiere a la creaci\u00f3n de paquetes [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-02-01T13:31:37+00:00","article_modified_time":"2023-03-21T13:38:40+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o","datePublished":"2023-02-01T13:31:37+00:00","dateModified":"2023-03-21T13:38:40+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/"},"wordCount":504,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","keywords":["Ciberseguran\u00e7a"],"articleSection":["Seguran\u00e7a cibern\u00e9tica"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/","url":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/","name":"LACNIC Blog | Estudo do LACNIC sobre anti-spoofing na regi\u00e3o","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","datePublished":"2023-02-01T13:31:37+00:00","dateModified":"2023-03-21T13:38:40+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/pt-br\/estudo-do-lacnic-sobre-anti-spoofing-na-regiao\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Estudo do LACNIC sobre anti-spoofing na regi\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"LACNIC Internet Community Newsletter","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/pt-br\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/02\/lacniccsirt-2023.png","jetpack_sharing_enabled":true,"wpml_current_locale":"pt_BR","wpml_translations":[{"locale":"es_ES","id":19673,"post_title":"Estudio de LACNIC sobre anti-spoofing en la regi\u00f3n","slug":"estudio-de-lacnic-sobre-anti-spoofing-en-la-region","href":"https:\/\/blog.lacnic.net\/estudio-de-lacnic-sobre-anti-spoofing-en-la-region\/"},{"locale":"en_US","id":19686,"post_title":"Study by LACNIC on Anti-spoofing in the Region","slug":"study-by-lacnic-on-anti-spoofing-in-the-region","href":"https:\/\/blog.lacnic.net\/en\/study-by-lacnic-on-anti-spoofing-in-the-region\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/19693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/comments?post=19693"}],"version-history":[{"count":7,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/19693\/revisions"}],"predecessor-version":[{"id":20634,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/19693\/revisions\/20634"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/16722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media\/19679"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media?parent=19693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/categories?post=19693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/tags?post=19693"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/archivo?post=19693"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/taxonomy-authors?post=19693"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/tipo_autor?post=19693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}