{"id":6668,"date":"2023-09-05T13:38:00","date_gmt":"2023-09-05T11:38:00","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?page_id=6668"},"modified":"2025-08-14T18:07:11","modified_gmt":"2025-08-14T16:07:11","slug":"fake-combell-emails","status":"publish","type":"page","link":"https:\/\/www.combell.com\/en\/blog\/fake-combell-emails\/","title":{"rendered":"It&#8217;s all about phishing: Fake messages sent out in our name"},"content":{"rendered":"<p><strong>On a regular basis fake emails and text messages are being sent out in our name to some of our customers. In this emails and text messages recipients are prompted to log on or pay a fake invoice. In reality these are fake versions and the login details are sent off to individuals who undoubtably had bad intentions with it.<\/strong><\/p>\n<p>Because we value the security of our customers and their data, we would like to inform you further about this incident via this page.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Has Combell been hacked? The answer is no<\/h2>\n<p>Unfortunately, several of our customers have already received phishing mails. Supposedly from Combell, but in reality from fraudulent cyber criminals.<\/p>\n<p>\"Has Combell been hacked?\", \"Is something wrong with your online security?\", \"Is my data safe with you?\" \u2026 We get such worried questions from time to time. It's perfectly normal for observant customers to question these fake emails and\/or text messages.. Because vigilance is key.<\/p>\n<p><strong>To answer those questions right away:<\/strong><\/p>\n<ul>\n<li>No, Combell has not been hacked.<\/li>\n<li>Yes, Combell is still your ultra-secure and reliable hosting partner.<\/li>\n<\/ul>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">How did hackers get your customer data? Well here's how:<\/h3>\n<p>When you register a domain name, the associated <strong>contact details are - by default - publicly available<\/strong>. This is information that anyone can look up in seconds.<\/p>\n<p>Just visit the <strong>WHOIS database<\/strong> and you\u2019ll immediately see who owns a given domain name. Hackers regularly scan this database for domains hosted with Combell. That\u2019s how your domain ends up on their list of targets.<\/p>\n<p>And they don\u2019t stop there: there are external tools that can find personal email addresses for anyone in your company - sometimes even via LinkedIn. Once they\u2019ve collected enough addresses,<strong> they send their fake but convincing phishing emails to general inboxes like <code>info@yourdomainname<\/code><\/strong>.<\/p>\n<p><strong><em>Ping! You\u2019ve got mail <\/em><\/strong>- but it\u2019s a fraudulent one.<\/p>\n<p><strong>As you can see, this has absolutely nothing to do with a security breach at Combell. No way!<\/strong><\/p>\n<p><strong>Important to know<\/strong>:<\/p>\n<ul>\n<li>Combell does not send these emails.<\/li>\n<li>WHOIS publication is a standard procedure for domain registration - unless you have activated privacy protection.<\/li>\n<li>Responsibility for these phishing attempts lies entirely with the criminals who send them.<\/li>\n<\/ul>\n<p><strong>How to recognise phishing<\/strong><\/p>\n<ol>\n<li><strong>Check the sender\u2019s address<\/strong>: it may look like ours, but with subtle differences.<\/li>\n<li><strong>Watch out for urgent or threatening language<\/strong>: \u201cPay now or your domain will be deleted\u201d is a classic example.<\/li>\n<li><strong>Inspect links before clicking<\/strong>: hover your mouse over them to see the real address. If it\u2019s not <em>combell.com<\/em> or another trusted domain, don\u2019t click.<\/li>\n<li><strong>Be cautious with attachments<\/strong>: never open unexpected files.<\/li>\n<\/ol>\n<p><strong>What you can do<\/strong><\/p>\n<ul>\n<li><strong>Activate WHOIS Privacy<\/strong> to hide your personal details.<\/li>\n<li><strong>Report phishing<\/strong> by forwarding suspicious emails to <code>abuse@combell.com<\/code>.<\/li>\n<li><strong>Ignore and delete<\/strong>: do not click links or open attachments.<\/li>\n<\/ul>\n<p>As we speak, Combell is doing everything in its power to put an end to this wave of fraud. We investigate every report! In the meantime, protect yourself and your mailbox by reading the useful information on our website. On this page, you are already at the right place.<\/p>\n<h2 class=\"wp-block-heading\">What should you pay close attention to?<\/h2>\n<p>Always check your address bar before entering your login details. The correct URL you need to see when you are asked to enter your details <strong>always starts with <a href=\"https:\/\/identity.combell.com\/login\" target=\"_blank\" rel=\"noopener\">https:\/\/identity.combell.com\/login<\/a><\/strong>. Whether you access it via www.combell.com or via my.combell.com, this is the only correct URL for the login screen.<\/p>\n<div class=\"wp-block-image is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"71\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-correct-url-of-our-login-screen.png\" alt=\"Phishing - correct url of our login screen\" class=\"wp-image-10397\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-correct-url-of-our-login-screen.png 482w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-correct-url-of-our-login-screen-300x44.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/figure>\n<\/div>\n<p>The <strong>right URL structure<\/strong> is very important. In a recent phishing attack, for example, the URL was <em>http:\/\/identity.combell.comauthentify.jgcoudray.fr\/combell\/index.html<\/em>. As you can see, part of the correct URL is often taken to make the fake URL as similar as possible to the correct URL. Always check that the URL starts with https:\/\/identity.combell.com\/login and not a variant.<\/p>\n<div class=\"wp-block-image wp-image-16891 size-full is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"66\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-false-url-of-our-login-screen-1024x66.png\" alt=\"Phishing - false url of our login screen\" class=\"wp-image-10398\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-false-url-of-our-login-screen-1024x66.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-false-url-of-our-login-screen-300x19.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-false-url-of-our-login-screen-768x49.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-false-url-of-our-login-screen.png 1120w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Example of a fake url<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">How can you avoid a phishing attack?<\/h2>\n<p><strong><a href=\"#examples\">Below, you will find further examples<\/a><\/strong> of phishing emails and fake login screens so that you do not fall into the trap.<\/p>\n<p>If you're unsure, <a href=\"https:\/\/www.combell.com\/en\/support\">don't hesitate to contact u<\/a>s. We know exactly which emails we have sent to you so we can quickly identify fake emails. If you need further information on these fake emails, or if you think you are a victim of this, please <a href=\"https:\/\/www.combell.com\/en\/support\">contact us as soon as possible<\/a>.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-36d2a42d uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">More tips and tricks<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail\/\">What is a phishing email and how can you tell it is a fake email?<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Wat do you need to do when you left behind your login details?<\/h2>\n<ul>\n<li>If you have received this email, clicked on the link and logged on with your credentials on this fake page, <span style=\"color: #ff0000;\"><strong>you need to take action immediately.<\/strong><\/span><\/li>\n<li>You need to<strong> reset the password of the Combell account<\/strong> which you used to log on. You can do this via <a href=\"https:\/\/identity.combell.com\/forgot-password\" target=\"_blank\" rel=\"noopener\">https:\/\/identity.combell.com\/forgot-password<\/a>.<\/li>\n<li>With your a-mail address and new password you can then log on again.<\/li>\n<li>We strongly advise you to <strong>reset all the passwords of your Combell users, and also all passwords of all products that you have with us<\/strong> (webhosting, FTP users, the passwords or your mailboxes, ...).<\/li>\n<li>We also strongly advise you to <strong>report<\/strong> this incident to <a href=\"mailto:support@combell.com\">support@combell.com<\/a>. An engineer will inspect your account and might give you more tips and advice to securing your data even more.<\/li>\n<li>If you see it fit, you can also file an<strong> official complaint<\/strong> at your local police station.<\/li>\n<\/ul>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What happens in a phishing attack?<\/h2>\n<ul>\n<li>Customers <strong>receive an email supposedly from Combell<\/strong>, informing them of irregular behaviour on their account.<\/li>\n<li>These emails were <strong>not<\/strong> sent by Combell but by a third party who used our logo and name to draft a so called \"phishing mail\".<\/li>\n<li>These emails were sent to <strong>random email addresses<\/strong> (info@, webmaster@, david@, tom@, ...) of domain names that are registered by Combell.<\/li>\n<li>The email prompted users to <strong>click on a link<\/strong> and log on to the Combell control panel with their customer details, to verify their identify.<\/li>\n<li>In reality, the visitor was <strong>redirected to a fake version of our website<\/strong>, which also was not hosted by Combell.<\/li>\n<li>When a user would log on to this<strong> fake website<\/strong> using his customer credentials, these credentials would most likely be sent off to a malicious person or organization. The details could then be used to illegally log on to a Combell account and alter or delete services and products, place fake orders, ...<\/li>\n<\/ul>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What does Combell do about this situation?<\/h2>\n<ul>\n<li>Combell takes <strong>every phishing report very seriously<\/strong>. It is important that our customers tell us what kind of fake emails are being sent.<\/li>\n<li>Depending on the number of reports, Combell can decide to inform its customers <strong>via social media or even via email<\/strong>.<\/li>\n<li><strong>Contact is always made immediately<\/strong> with the company that was used to host the fake website or to send the emails. This means we can often take the fake websites offline within a few hours, but we are dependent on other web hosting providers to do so.<\/li>\n<li>Our <strong>spam filters<\/strong> are updated as soon as possible to <strong>immediately block fake emails<\/strong> on our own servers, should they be sent again.<\/li>\n<li>For additional security, we offer <a href=\"https:\/\/www.combell.com\/en\/blog\/two-factor-authentication\/\"><strong>two-step verification<\/strong><\/a> for your Combell account. If your password ends up in the wrong hands despite all the precautions taken, your account remains protected by the second factor.<\/li>\n<\/ul>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\" id=\"examples\">Examples of fake emails and text messages<\/h2>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"438\" height=\"934\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/image.jpg\" alt=\"\" class=\"wp-image-11798\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/image.jpg 438w, https:\/\/www.combell.com\/en\/blog\/files\/image-141x300.jpg 141w\" sizes=\"(max-width: 438px) 100vw, 438px\" \/><figcaption class=\"wp-element-caption\">Example smishing (phishing via sms) September 2023<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/combell-phishing.png\" alt=\"\" class=\"wp-image-25857\"\/><figcaption class=\"wp-element-caption\">Example phishing mail August 2023<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1867\" height=\"923\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png.png\" alt=\"Example phishing mail January 2023\" class=\"wp-image-10399\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png.png 1867w, https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png-300x148.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png-1024x506.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png-768x380.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/Example-phishing-mail-January-2023.png-1536x759.png 1536w\" sizes=\"(max-width: 1867px) 100vw, 1867px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail January 2023<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1034\" height=\"1272\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/phishingeindmei.png\" alt=\"\" class=\"wp-image-8232\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/phishingeindmei.png 1034w, https:\/\/www.combell.com\/en\/blog\/files\/phishingeindmei-244x300.png 244w, https:\/\/www.combell.com\/en\/blog\/files\/phishingeindmei-832x1024.png 832w, https:\/\/www.combell.com\/en\/blog\/files\/phishingeindmei-768x945.png 768w\" sizes=\"(max-width: 1034px) 100vw, 1034px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail May 2020<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1309\" height=\"1413\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-mail-28-april-2020.png\" alt=\"Phishing mail 28 april 2020\" class=\"wp-image-8123\" style=\"width:850px\" title=\"Phishing mail 28 april 2020\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-mail-28-april-2020.png 1309w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-mail-28-april-2020-278x300.png 278w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-mail-28-april-2020-949x1024.png 949w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-mail-28-april-2020-768x829.png 768w\" sizes=\"(max-width: 1309px) 100vw, 1309px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail April 2020<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"909\" height=\"773\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-december-2019.png\" alt=\"Voorbeeld phishing mail december 2019\" class=\"wp-image-7868\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-december-2019.png 909w, https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-december-2019-300x255.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-december-2019-768x653.png 768w\" sizes=\"(max-width: 909px) 100vw, 909px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail December 2019<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1092\" height=\"835\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-november-2019.png\" alt=\"Example phishing mail November 2019\" class=\"wp-image-7841\" style=\"width:850px\" title=\"Example phishing mail November 2019\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-november-2019.png 1092w, https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-november-2019-300x229.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-november-2019-768x587.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/Voorbeeld-phishing-mail-november-2019-1024x783.png 1024w\" sizes=\"(max-width: 1092px) 100vw, 1092px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail November 2019<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"689\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mail-september-2019.png\" alt=\"Phishing voorbeeld mail september 2019\" class=\"wp-image-7635\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mail-september-2019.png 839w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mail-september-2019-300x246.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mail-september-2019-768x631.png 768w\" sizes=\"(max-width: 839px) 100vw, 839px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail September 2019<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"686\" height=\"736\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-screenshot-september-2019.png\" alt=\"\" class=\"wp-image-7636\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-screenshot-september-2019.png 686w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-screenshot-september-2019-280x300.png 280w\" sizes=\"(max-width: 686px) 100vw, 686px\" \/><figcaption class=\"wp-element-caption\">Example false login screen September 2019<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image rounded border border-danger  is-style-devplus-image-rounded-shadow\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"865\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mei-2019.png\" alt=\"Phishing voorbeeld mei 2019\" class=\"wp-image-7423\" style=\"width:850px\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mei-2019.png 605w, https:\/\/www.combell.com\/en\/blog\/files\/Phishing-voorbeeld-mei-2019-210x300.png 210w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><figcaption class=\"wp-element-caption\">Example phishing mail May 2019<\/figcaption><\/figure>\n<\/div>\n<h2 class=\"wp-block-heading\">&nbsp;<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>On a regular basis fake emails and text messages are being sent out in our name to some of our customers. In this emails and text messages recipients are prompted...<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-featured":false,"post-featured-opt":false,"post-featured-opt-md":false,"post-featured-opt-sm":false,"post-featured-opt-xs":false,"post-most-popular":false,"post-author":false},"uagb_author_info":{"display_name":"Combell","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/blogadmin\/"},"uagb_comment_info":0,"uagb_excerpt":"On a regular basis fake emails and text messages are being sent out in our name to some of our customers. In this emails and text messages recipients are prompted...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/pages\/6668"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=6668"}],"version-history":[{"count":30,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/pages\/6668\/revisions"}],"predecessor-version":[{"id":13455,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/pages\/6668\/revisions\/13455"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=6668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}