{"id":1012,"date":"2026-02-24T18:43:43","date_gmt":"2026-02-25T02:43:43","guid":{"rendered":"https:\/\/greenmonkeysstudio.com\/blog\/?p=1012"},"modified":"2026-02-24T19:08:55","modified_gmt":"2026-02-25T03:08:55","slug":"how-to-identify-what-hackers-actually-did-to-your-site","status":"publish","type":"post","link":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/","title":{"rendered":"How To Identify What Hackers Actually Did To Your Site"},"content":{"rendered":"<p><img decoding=\"async\" class=\"post-img alignnone\" src=\"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg\" alt='Image of a magnifying glass looking at a computer keyboard.' \/><\/p>\n<article>\n<p>Before you can fix anything, you need to understand what actually happened. This is the step most people skip \u2014 not because they don\u2019t care, but because <!--more-->they\u2019re overwhelmed. A hacked website can feel like a maze of broken pieces, strange behavior, and unfamiliar files. But taking the time to assess the damage is essential. It tells you what you\u2019re dealing with, how deep the intrusion goes, and what needs to be cleaned or rebuilt.<\/p>\n<p>Some hacks are loud and obvious. Others are quiet, subtle, and designed to stay hidden for months. Your job right now isn\u2019t to fix anything \u2014 it\u2019s simply to observe.<\/p>\n<h2>Common Signs Your Site Was Compromised<\/h2>\n<p>Attackers leave traces, even when they try to hide. As you begin reviewing your site, watch for these red flags:<\/p>\n<ul>\n<li><strong>New or unfamiliar admin accounts<\/strong><br \/>\n    Hackers often create their own access points so they can return later. These accounts may look legitimate at first glance \u2014 names like &#8220;system,&#8221; &#8220;backup,&#8221; or &#8220;support.&#8221;<\/li>\n<li><strong>Modified or suspicious files<\/strong><br \/>\n    Files with strange names, unexpected code, or recent modification dates are major indicators of tampering. Malware often hides inside core files or uploads itself into random directories.<\/li>\n<li><strong>Redirects to strange websites<\/strong><br \/>\n    If your site suddenly sends visitors to spam pages, adult content, or phishing sites, that\u2019s a clear sign of injected scripts or compromised plugins.<\/li>\n<li><strong>Spam content injected into pages<\/strong><br \/>\n    Hidden text, strange links, or entire pages you didn\u2019t create may appear. Some attackers use your site to boost their own SEO or distribute scams.<\/li>\n<li><strong>Unusual server activity<\/strong><br \/>\n    High CPU usage, unexplained spikes in traffic, or large outbound email volumes can indicate bots, scripts, or malicious processes running in the background.<\/li>\n<li><strong>Disabled security plugins or settings<\/strong><br \/>\n    Hackers often turn off firewalls, scanners, or login protections to make their job easier.<\/li>\n<li><strong>Unexpected changes to your homepage<\/strong><br \/>\n    This can range from defacement to subtle code injections that aren\u2019t immediately visible.<\/li>\n<\/ul>\n<p>If you\u2019re not sure what you\u2019re looking at, that\u2019s completely normal. Hackers intentionally blend their changes into legitimate files and directories.<\/p>\n<h2>Where To Look<\/h2>\n<p>To understand the full scope of the damage, you\u2019ll need to check several areas of your website and hosting environment. Each one reveals different clues.<\/p>\n<ul>\n<li><strong>Your CMS admin panel<\/strong><br \/>\n    Look for new users, suspicious plugins, altered settings, or unfamiliar content.<\/li>\n<li><strong>File manager or FTP<\/strong><br \/>\n    Browse your file structure for recently modified files, unknown folders, or scripts that don\u2019t belong.<\/li>\n<li><strong>Server logs<\/strong><br \/>\n    Access logs, error logs, and login logs can show when the intrusion happened and what the attacker did.<\/li>\n<li><strong>Recently modified files<\/strong><br \/>\n    Most hosting dashboards and FTP clients let you sort by date. Anything modified around the time of the hack deserves attention.<\/li>\n<li><strong>Plugin and theme directories<\/strong><br \/>\n    These are common entry points. Outdated or abandoned plugins are especially vulnerable.<\/li>\n<\/ul>\n<p>Once you\u2019ve gathered this information, you\u2019ll have a clearer picture of what was touched, what was added, and what might still be hiding. With that foundation, you\u2019re ready for the next step: scanning for malware and isolating the infection.<\/p>\n<h2>Not Sure What You&#8217;re Seeing?<\/h2>\n<p>Green Monkeys Studio can perform a full security audit and identify exactly what was compromised. We\u2019ll help you understand the damage and guide you through a safe, complete recovery.<\/p>\n<p>If your site is currently hacked, Green Monkeys Studio can help you recover quickly and safely. Call us at <a href=\"tel:(206) 551-6177\">(206) 551-6177<\/a> or click to <a href=\"https:\/\/greenmonkeysstudio.com\/book-a-consultation\" target=\"_self\">book a free consultation<\/a> today. Let\u2019s get your website back on track and protected for the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before you can fix anything, you need to understand what actually happened. This is the step most people skip \u2014 not because they don\u2019t care, but because<\/p>\n","protected":false},"author":3,"featured_media":1013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17,36,3,7,20,24],"tags":[],"class_list":["post-1012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-cybersecurity","category-web-design","category-web-security","category-website","category-wordpress"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design<\/title>\n<meta name=\"description\" content=\"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design\" \/>\n<meta property=\"og:description\" content=\"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/\" \/>\n<meta property=\"og:site_name\" content=\"Monkey Zone: All Things SEO and Design\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreenMonkeysStudio\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-25T02:43:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T03:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jesus Gonzalez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jesus Gonzalez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/\"},\"author\":{\"name\":\"Jesus Gonzalez\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/person\\\/5296cba915b97cf5031ce4847da4677b\"},\"headline\":\"How To Identify What Hackers Actually Did To Your Site\",\"datePublished\":\"2026-02-25T02:43:43+00:00\",\"dateModified\":\"2026-02-25T03:08:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/how-to-identify-what-hackers-have-done.jpg\",\"articleSection\":[\"business\",\"Cybersecurity\",\"Web Design\",\"Web Security\",\"Website\",\"WordPress\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/\",\"name\":\"How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/how-to-identify-what-hackers-have-done.jpg\",\"datePublished\":\"2026-02-25T02:43:43+00:00\",\"dateModified\":\"2026-02-25T03:08:55+00:00\",\"description\":\"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#primaryimage\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/how-to-identify-what-hackers-have-done.jpg\",\"contentUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/how-to-identify-what-hackers-have-done.jpg\",\"width\":1200,\"height\":520,\"caption\":\"Image of magnifying glass looking at a computer keyboard.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/how-to-identify-what-hackers-actually-did-to-your-site\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Identify What Hackers Actually Did To Your Site\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\",\"name\":\"Green Monkeys Studio\",\"description\":\"Be in the Monkey Zone of Information!\",\"publisher\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\",\"name\":\"Green Monkeys Studio\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-gms-logo.png\",\"contentUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-gms-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Green Monkeys Studio\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreenMonkeysStudio\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/person\\\/5296cba915b97cf5031ce4847da4677b\",\"name\":\"Jesus Gonzalez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"caption\":\"Jesus Gonzalez\"},\"sameAs\":[\"https:\\\/\\\/greenmonkeysstudio.com\"],\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/author\\\/lexiriam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design","description":"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/","og_locale":"en_US","og_type":"article","og_title":"How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design","og_description":"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.","og_url":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/","og_site_name":"Monkey Zone: All Things SEO and Design","article_publisher":"https:\/\/www.facebook.com\/GreenMonkeysStudio\/","article_published_time":"2026-02-25T02:43:43+00:00","article_modified_time":"2026-02-25T03:08:55+00:00","og_image":[{"width":1200,"height":520,"url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg","type":"image\/jpeg"}],"author":"Jesus Gonzalez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jesus Gonzalez","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#article","isPartOf":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/"},"author":{"name":"Jesus Gonzalez","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/person\/5296cba915b97cf5031ce4847da4677b"},"headline":"How To Identify What Hackers Actually Did To Your Site","datePublished":"2026-02-25T02:43:43+00:00","dateModified":"2026-02-25T03:08:55+00:00","mainEntityOfPage":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/"},"wordCount":597,"publisher":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#primaryimage"},"thumbnailUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg","articleSection":["business","Cybersecurity","Web Design","Web Security","Website","WordPress"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/","url":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/","name":"How To Identify What Hackers Actually Did To Your Site - Monkey Zone: All Things SEO and Design","isPartOf":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#primaryimage"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#primaryimage"},"thumbnailUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg","datePublished":"2026-02-25T02:43:43+00:00","dateModified":"2026-02-25T03:08:55+00:00","description":"Learn how to assess the damage after a website hack, including signs of malware, unauthorized users, and suspicious file changes.","breadcrumb":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#primaryimage","url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg","contentUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/02\/how-to-identify-what-hackers-have-done.jpg","width":1200,"height":520,"caption":"Image of magnifying glass looking at a computer keyboard."},{"@type":"BreadcrumbList","@id":"https:\/\/greenmonkeysstudio.com\/blog\/how-to-identify-what-hackers-actually-did-to-your-site\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/greenmonkeysstudio.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Identify What Hackers Actually Did To Your Site"}]},{"@type":"WebSite","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#website","url":"https:\/\/greenmonkeysstudio.com\/blog\/","name":"Green Monkeys Studio","description":"Be in the Monkey Zone of Information!","publisher":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/greenmonkeysstudio.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization","name":"Green Monkeys Studio","url":"https:\/\/greenmonkeysstudio.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2021\/07\/cropped-gms-logo.png","contentUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2021\/07\/cropped-gms-logo.png","width":512,"height":512,"caption":"Green Monkeys Studio"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreenMonkeysStudio\/"]},{"@type":"Person","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/person\/5296cba915b97cf5031ce4847da4677b","name":"Jesus Gonzalez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","caption":"Jesus Gonzalez"},"sameAs":["https:\/\/greenmonkeysstudio.com"],"url":"https:\/\/greenmonkeysstudio.com\/blog\/author\/lexiriam\/"}]}},"_links":{"self":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":1,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1012\/revisions"}],"predecessor-version":[{"id":1014,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1012\/revisions\/1014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/media\/1013"}],"wp:attachment":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/media?parent=1012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/categories?post=1012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/tags?post=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}