{"id":24280,"date":"2013-04-29T05:00:13","date_gmt":"2013-04-29T12:00:13","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=24280"},"modified":"2025-08-31T23:17:41","modified_gmt":"2025-09-01T06:17:41","slug":"visualizing-a-ddos-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/","title":{"rendered":"Visualizing A DDoS Cyber Attack"},"content":{"rendered":"<p>A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker\u2019s <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/what-is-a-botnet?utm_source=social&amp;utm_medium=blog&amp;utm_campaign=blogc\">botnet<\/a>, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn\u2019t much for a user like you or me to see beyond an \u201cerror\u201d page. We\u2019re simply turned away from the website, and we\u2019re not quite sure why.<\/p>\n<p>However, with the help of website traffic visualization technology, <a href=\"http:\/\/www.videolan.org\/index.html\">VideoLAN Organization<\/a> has been able to share a behind-the-scenes look at what actually happens to a website when it is being attacked.<\/p>\n<h2><b>What you\u2019ll see in the video below is a record of the April 23<sup>rd<\/sup> DDoS attack against VideoLAN:<\/b><\/h2>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/hNjdBSoIa8k\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>In this video, each ball represents a server request, and the different colors represent the specific computers that sent each request. A server request occurs when you enter a web address in your browser to gain entry to a desired web page, and if too many requests are sent at once, the web page will become overwhelmed and fail to load.<\/p>\n<p>In this visualization, the paddle you see is the server attempting to keep up with the requests (think of it like the classic game of Pong). During an attack, requests completely bombard the website with traffic at one specific <a href=\"http:\/\/www.thefreedictionary.com\/chokepoint\">chokepoint<\/a>, leaving other legitimate requests (colored balls) to bounce away unfulfilled. In this way, a hacker can monopolize a server and effectively take down an entire website. If a site cannot keep up with a high number of requests, it will not work properly, and you will be greeted with an \u201cError Not Found\u201d page instead.<\/p>\n<h2><b>For context, here is another traffic visualization for a site that isn\u2019t experiencing an attack:<\/b><\/h2>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/HeWfkPeDQbY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>While it\u2019s not yet clear why a hacker wanted to attack VideoLAN\u2019s servers, DDoS attacks mainly affect organizations, businesses, and retail websites\u2013not home computers. Still, the videos above provide a great visual resource to understand how these attacks work.<\/p>\n<h2><b>Do your part to stop DDoS attacks:<\/b><\/h2>\n<p>While your personal computer may not be the victim of a DDoS attack, if your computer becomes infected with malicious software, it could easily be used to assist cybercriminals in this type of disruption. As I stated above, one way that hackers generate this much traffic is through a botnet, or a network of infected computers. To ensure your computer doesn\u2019t become part of a botnet, always keep security software like<a href=\"http:\/\/home.mcafee.com\/store\/all-access-security?utm_source=social&amp;utm_medium=blog&amp;utm_campaign=maa\"> McAfee All Access<\/a> up to date, and regularly scan your device for potential threats.<\/p>\n<p>For more on this topic and other security news and events, be sure to follow our team on <a href=\"http:\/\/www.facebook.com\/mcafee\">Facebook<\/a> and on Twitter with <a href=\"http:\/\/www.twitter.com\/mcafeeconsumer\">@McAfeeConsumer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated&#8230;<\/p>\n","protected":false},"author":674,"featured_media":149435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[49,180,18],"coauthors":[3973],"class_list":["post-24280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-botnet","tag-malware","tag-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Visualizing A DDoS Cyber Attack | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Visualizing A DDoS Cyber Attack | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-29T12:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T06:17:41+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Visualizing A DDoS Cyber Attack\",\"datePublished\":\"2013-04-29T12:00:13+00:00\",\"dateModified\":\"2025-09-01T06:17:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\"},\"wordCount\":460,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg\",\"keywords\":[\"botnet\",\"malware\",\"network security\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\",\"name\":\"Visualizing A DDoS Cyber Attack | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg\",\"datePublished\":\"2013-04-29T12:00:13+00:00\",\"dateModified\":\"2025-09-01T06:17:41+00:00\",\"description\":\"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg\",\"width\":614,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Visualizing A DDoS Cyber Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Visualizing A DDoS Cyber Attack | McAfee Blog","description":"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Visualizing A DDoS Cyber Attack | McAfee Blog","og_description":"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-04-29T12:00:13+00:00","article_modified_time":"2025-09-01T06:17:41+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Visualizing A DDoS Cyber Attack","datePublished":"2013-04-29T12:00:13+00:00","dateModified":"2025-09-01T06:17:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/"},"wordCount":460,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg","keywords":["botnet","malware","network security"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/","name":"Visualizing A DDoS Cyber Attack | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg","datePublished":"2013-04-29T12:00:13+00:00","dateModified":"2025-09-01T06:17:41+00:00","description":"A\u00a0denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/03\/614x300_Blog_wh-cyberattacks.jpg","width":614,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/visualizing-a-ddos-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Visualizing A DDoS Cyber Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=24280"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24280\/revisions"}],"predecessor-version":[{"id":221975,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24280\/revisions\/221975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/149435"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=24280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=24280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=24280"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=24280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}