Ddos protection cloudflare example. Last updated: Nov 4, 2024.
Ddos protection cloudflare example. For examples of API calls, refer to Common API calls.
Ddos protection cloudflare example The Advanced TCP Protection API only supports API token authentication. 65 Tbps. The updates either improve a rule's accuracy, lower false positives rates, or increase the protection due to a change in the threat landscape. The Cloudflare Network-layer DDoS Attack Protection managed ruleset is a set of pre-configured rules used to match known DDoS attack vectors at levels 3 and 4 of the OSI model. Sep 20, 2021 · Our unmetered DDoS protection commitment is possible due to our ongoing investment in our network and technology stack. Enable I'm Under Attack mode (or other challenges) for specific ASNs (hosts/ISPs that own IP addresses — for example, Amazon has an ASN, Cloudflare has an ASN, Comcast has an ASN, etc. Reports contain the following information: Total number of DDoS attacks; Largest DDoS attack in packets per second (pps) and bits per second (bps) For example, Cloudflare onboarded a Fortune 500 company to Cloudflare Magic Transit (which provides DDoS protection and more for on-premise networks) in 2020. Cloudflare's DDoS protection systems automatically detect and mitigate DDoS attacks. Define overrides for the Network-layer DDoS Attack Protection managed ruleset to change the action applied to a given attack or modify the sensitivity level of the detection mechanism. Want to learn more about Cloudflare’s Adaptive DDoS Protection? Visit our developer site. Additionally, because traffic to Cloudflare will originate from a limited set of IP addresses of the third-party CDN, in rare occasions — such as when using the Akamai CDN in front of Cloudflare — it may appear as if the CDN is launching a DDoS attack against Cloudflare due to the amount of traffic from these limited IP addresses. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. Aug 13, 2024 · Requires allowlisting Cloudflare IP ranges at your origin server. For example, if you want to test Cloudflare against an HTTP DDoS attack and you are only using Magic Transit, the test is going to fail because you need to onboard your HTTP application to Cloudflare's reverse proxy service to test our HTTP DDoS Protection. Cloudflare brings security and performance to our customers' digital estates. In addition to blocking DDoS attacks at layers 4 and 7, Cloudflare mitigates layer 3 DDoS attacks. Additionally, the systems may flag suspiciously-looking incoming traffic from legacy applications, Internet services, or faulty client applications as malicious and apply mitigation actions. Once a botnet has been established, the attacker is able to direct an attack by sending remote instructions to each bot. Each zone has the HTTP DDoS Attack Protection managed ruleset enabled by default. The ruleset is available for Cloudflare customers on all plans and is enabled by default. Cloudflare has a regular cadence of releasing updates and new rules to the DDoS managed rulesets. Jul 6, 2018 · For DDoS purporses, it may totally be reasonable to just receive the packets in the application and process them in userspace. Third-party services and DDoS protection; Prevent DDoS attacks ↗; Respond to DDoS attacks What is a DNS amplification attack? This DDoS attack is a reflection-based volumetric distributed denial-of-service (DDoS) attack in which an attacker leverages the functionality of open DNS resolvers in order to overwhelm a target server or network with an amplified amount of traffic, rendering the server and its surrounding infrastructure inaccessible. Since CNAME records are not allowed on the zone apex ↗ (example. Retrieve HTTP events using Cloudflare Logs to integrate them into your SIEM systems. FlareBypasser is a service to bypass Cloudflare and DDoS-GUARD protection, work to solve the challenge after October 20, 2024. Cloudflare L3/4 DDoS Managed Rules Internet service providers (ISPs) and telecommunications companies (such as T-Mobile or British Telecom) are vulnerable to network DDoS attacks, which are often focused on the end customer - for example, trying to attack a company or remote worker connected to the internet via a broadband internet service provider. Oct 2, 2024 · Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Scalable Mitigation: The service handles attacks of any size, from small-scale to those exceeding 1 Tbps. Until compromised IoT devices can be updated or replaced, the only way to withstand these types of attacks is to use a very large and highly distributed DNS system that can monitor, absorb, and block the attack traffic in realtime. Cloudflare constantly updates these managed rulesets to improve the attack coverage, increase the mitigation consistency, cover new and emerging threats, and ensure cost-efficient mitigations. The request body can contain only the fields you want to update (from mode, profile_sensitivity, rate_sensitivity, and burst_sensitivity). For DDoS attacks with random/spoofed source IP's, it might be worthwhile disabling conntrack to gain some speed. 2 days ago · Cloudflare, for example, has a free plan that includes some level of DDoS protection. For example, you can set different sensitivity levels for different destination IP addresses or ports: a medium sensitivity level for destination IP address A and a low sensitivity level for destination IP address B. This ruleset includes rules to detect and mitigate DDoS attacks over HTTP and HTTPS. This page contains an example of the TCP protection rule JSON object used in the API. To detect and mitigate DDoS attacks, Cloudflare’s autonomous edge and centralized DDoS systems analyze traffic samples out of path, which allows Cloudflare to asynchronously detect DDoS attacks without causing latency or impacting performance. Cloudflare Magic Transit is designed specifically to stop attacks on internal network infrastructure, including DDoS attacks at any layer. preparing applicant for future possibility Preventing resulting shapefile being added to ArcGIS Pro map by ArcPy. Each account has the Network-layer DDoS Attack Protection managed ruleset enabled by default. Web Application Feb 24, 2022 · How to sample a single point from a volume Being honest with rejection vs. Unfortunately, these malicious attacks are a constant threat to websites. 2 million request-per-second (rps) DDoS attack, an attack almost three times larger than any previous one that we're aware of. These systems include multiple dynamic mitigation rules exposed as DDoS attack protection managed rulesets. And even when the protection kicks in, only a little more than 50% of the traffic is mitigated, and the rest of the attack traffic just bypasses all of the protections. DDoS Protection: Cloudflare's DDoS protection, covering the network, transport and application layer, prevents volumetric attacks that could compromise the availability of connected systems. This page contains an example of the DNS protection rule JSON object used in the API. Refer to the following pages for more information about adjusting DDoS rules according to your situation: When each ping request is made, Cloudflare handles the processing and response process of the ICMP echo request and reply on our network edge. How it works FlareBypasser starts a server, and it waits for user requests. Aug 13, 2024 · By the end of this module, you will be able to: Audit DNS records to prevent accidental IP address exposures. Third-party services and DDoS Aug 13, 2024 · OSI Layer Ruleset / Feature Example of covered DDoS attack vectors; L3/4: Network-layer DDoS Attack Protection: UDP flood attack SYN floods SYN-ACK reflection attack ACK floods Mirai and Mirai-variant L3/4 attacks ICMP flood attack Advanced DDoS Protection protects the IP prefixes you select from sophisticated DDoS attacks. The DDoS Attack Protection managed rulesets provide protection against a variety of DDoS attacks across L3/4 (layers 3/4) and L7 of the OSI model. However, these free tiers typically come with limitations and might not be suitable for larger websites or critical business applications. DDoS alerts are currently only available for DDoS attacks detected and mitigated by the DDoS managed rulesets. When a victim’s server or network is targeted by the botnet, each bot sends requests to the target’s IP address, potentially causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic. Cloudflare has observed and mitigated massive numbers of DDoS attacks against network infrastructure. Jul 30, 2013 · CloudFlare powers DNS for wildcard subdomains, but only offers the performance and security proxy service for wildcard subdomains at the Enterprise level. We've seen examples of small businesses that survive massive attacks to then be crippled by the bills other DDoS mitigation vendors sent them. All of these additional services can help protect your service from unnecessary traffic whether it be malicious requests (blocked by DDoS Protection, Bot Management, or WAF) or Apr 25, 2017 · Cloudflare provides numerous benefits to ecommerce sites, including advanced DDOS protection and an industry-leading Web Application Firewall (WAF) that helps secure your transactions and protect customers’ private data. Aug 27, 2024 · Learn about best practices for configuring Cloudflare's DDoS protection. You can find this value in the Cloudflare dashboard. As a result, if you are a Free, Pro or Business customer, wildcard subdomain records can not be proxied through CloudFlare and should be removed for DDoS protection. Properly tuned applications can get pretty decent numbers. Jul 11, 2022 · The DDoS Protection team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. DDoS overrides allow you to customize the action and sensitivity of one or more rules in the managed ruleset. For more information on attack signatures, refer to How DDoS protection works. Cloudflare Magic Transit. This strategy takes the resource cost of both bandwidth and processing power off the targeted server and places it on Cloudflare’s Anycast network. This means that you do not need to deploy the managed ruleset to the ddos_l4 phase entry point ruleset Dec 30, 2024 · For more information about Network-layer DDoS Attack Protection, refer to Network-layer DDoS Attack Protection managed ruleset. This approach Nov 25, 2024 · The Cloudflare DDoS Botnet Threat Feed is a threat intelligence feed for service providers (SPs) such as hosting providers and Internet service providers (ISPs) that provides information about their own IP addresses that have participated in HTTP DDoS attacks as observed from Cloudflare's global network. The sensitivity levels manipulate the thresholds. Configure notifications to receive real-time alerts (within ~1 minute) about L3/4 and L7 DDoS attacks on your Internet properties, depending on your plan and services. The company had received a ransom letter from a cyber criminal group demanding 20 Bitcoin. Cloudflare is a global content delivery network (CDN) provider that also offers free protection from distributed denial-of-service (DDoS) attacks. The {account_id} argument is the account ID (a hexadecimal string). Historically to protect these customers, service providers have relied on Oct 23, 2024 · In many cases, flagging bad traffic can be straightforward. The DDoS Attack Protection managed rulesets provide comprehensive protection against a variety of DDoS attacks across L3/4 (network layer) and L7 (application layer) of the OSI model ↗. Generally speaking, many of the attacks are fundamentally similar and can be attempted using one more many sources of malicious traffic. A false positive is an incorrect identification. Dec 9, 2021 · There are rulesets of HTTP DDoS Protection rules, Network-layer DDoS Protection rules and Advanced TCP Protection rules. The following table summarizes the available operations. You can configure Advanced TCP Protection using the Advanced TCP Protection API. And with our built-in, software-defined IP firewall, you can easily control the flow of traffic to your application servers — no hardware or costly maintenance required. Thresholds are based on your network's unique traffic and are configured by Cloudflare. test: Rules used for testing the detection, mitigation, and alerting capabilities of Cloudflare's DDoS protection products. Add a rule to the ruleset of the ddos_l7 phase that applies the Cloudflare HTTP DDoS Attack Protection managed ruleset (with ID <HTTP_DDOS_RULESET_ID>). You can customize the mitigation rules included in these rulesets to optimize and tailor the protection to your How Cloudflare helps prevent DDoS attacks. In this blog post, we will cover the latter two rulesets. Cloudflare Magic Transit provides cloud-native, in-line DDoS protection and traffic acceleration for all your Internet-facing networks that serve incoming user traffic from the Internet, regardless of where they are deployed, whether on-premise, in the cloud, or a combination of the two (that is, hybrid architecture). The new tab provides insights about which DNS Set an override expression for the HTTP DDoS Attack Protection managed ruleset to define a specific scope for sensitivity level or action adjustments. You can define overrides in the Cloudflare dashboard or define overrides via Rulesets API. com), you can only proxy your zone apex to Cloudflare if your authoritative DNS provider supports CNAME Flattening ↗. The Cloudflare Network-layer DDoS Attack Protection Managed Ruleset is a set of pre-configured rules used to match known DDoS attack vectors at levels 3 and 4 of the OSI model. Nov 20, 2024 · Learn more about DDoS protection at layers 3, 4, and 7 in our DDoS protection documentation. We will use "example. Cloudflare's Advanced DNS Protection, powered by flowtrackd ↗, provides stateful protection against DNS-based DDoS attacks, specifically sophisticated and fully randomized DNS attacks such as random prefix attacks. The Cloudflare WAF and CDN also stop layer 3 DDoS attacks by only accepting traffic to HTTP and HTTPS ports The Cloudflare Network-layer DDoS Attack Protection Managed Ruleset. Nov 4, 2024 · Third-party services and DDoS protection; Prevent DDoS attacks ↗ Thank you for helping improve Cloudflare's documentation! Edit page. Cloudflare offers integrated L3-7 DDoS protection that helps organizations monitor, prevent, and mitigate attacks before they reach targeted applications, networks, and infrastructure. Alerts are not yet available for DDoS attacks detected and mitigated by the Advanced TCP Protection and the Advanced DNS Protection system. 5 million DDoS attacks (an average of 2,200 DDoS attacks per hour). Cloudflare DDoS Web Protection Powerful, always-on DDoS protection for web applications and websites. Spectrum works as a layer 4 reverse proxy, extending Cloudflare DDoS protection and traffic acceleration to any box, container, or virtual machine (VM) connected to the Internet. DDoS attacks can slow or shut down services, but Cloudflare stops them all. Mar 7, 2024 · Diagram of Cloudflare’s DDoS protection systems. Not using Cloudflare yet? This page contains an example of the DNS protection rule JSON object used in the API. For examples of API calls, refer to Common API calls. For example, in June 2020, Cloudflare mitigated a 754 million packet-per-second DDoS attack. Learn about how Cloudflare's DDoS Protection protects against DNS flood attacks. Aug 23, 2024 · Configure the Cloudflare Network-layer DDoS Attack Protection managed ruleset by defining overrides at the account level using the Rulesets API. These rules are read-only — you cannot override their sensitivity level or action. . Highly targeted rules for mitigating DDoS attacks with a high confidence rate. Reference information for Cloudflare's DDoS protection. 100% agreed! For exactly this reason I was looking if I could host a VPS for the layer 7 protection and Cloudflare for the big guns and "just" the DDoS protection, BUT there is no option to just take the DDoS and keep the traffic encrypted. You can use their services to mitigate DDoS attacks against your website or if you want to use a globally available CDN to serve your content. Cloudflare provides automatic, intelligent DDoS mitigation from the edge of our global network — mitigating most attacks in three seconds. They operate a massive global network with data centers in over 330 cities worldwide, handling trillions of requests per day. For example, you can set different sensitivity levels for different request URI paths: a medium sensitivity level for URI path A and a low sensitivity level for URI path B. Cloudflare features 321 Tbps of network capacity, which is much larger than the largest DDoS attacks ever recorded. You can choose from different delivery methods. While some of these attacks were quite large, the majority were both small and short . Cloudflare is a company that provides content delivery network (CDN) and distributed DNS services by acting as a reverse proxy for websites. You only have to create a rule in the phase ruleset to Set an override expression for the Network-layer DDoS Attack Protection managed ruleset to define a specific scope for sensitivity level or action adjustments. Dec 22, 2022 · Introduction. Caching Proxied traffic also benefits from the default optimizations of the Cloudflare cache . All Go to L3/4 DDoS > Advanced Protection > Advanced TCP Protection. Dec 16, 2024 · A partial (CNAME) setup requires the proxied hostname to be pointed to Cloudflare via a CNAME record. These new data points are available in a new “DNS Protection” tab within the Cloudflare Network Analytics dashboard. To prove their intentions, the group had already launched Gb-strong attacks at a single server. Optimize caching and security to reduce incoming traffic (whether malicious or legitimate). This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols. Sep 19, 2022 · Cloudflare’s Adaptive DDoS Protection takes us one step closer to achieving that vision: making Cloudflare’s DDoS protection even more intelligent, sophisticated, and tailored to our customer’s unique traffic patterns and individual needs. Learn how Cloudflare's DDoS protection stops denial-of-service attacks. Out of those 6 million, Cloudflare’s autonomous DDoS defense systems detected and mitigated over 200 hyper-volumetric DDoS attacks exceeding rates of 3 terabits per second (Tbps) and 2 billion packets per second (Bpps). All you have to do is sign up, point your domain to your CDN’s name servers, and let it proxy your traffic to your origin server. The CDN will cache your content and serve it to users from the nearest server automatically. ; this is useful if a majority of attack traffic comes from a specific host), countries, or IP ranges using IP Access Rules. Vulnerable to IP spoofing. Earlier this summer, Cloudflare’s autonomous edge DDoS protection systems automatically detected and mitigated a 17. Aug 19, 2021 · This post is also available in Français, Deutsch, 简体中文, 繁體中文, 日本語, 한국어. Sep 26, 2024 · Configure the HTTP DDoS Attack Protection managed ruleset by defining overrides using the Rulesets API. The following sections contain example requests for common API calls. Cloudflare updates the list of rules in the managed ruleset on a regular basis. This trend has remained consistent—even as overall numbers of attacks rose and fell, and different network-layer protocols gained and lost popularity Jan 6, 2025 · One of Cloudflare's core offerings is protection against Distributed Denial of Service (DDoS) attacks. 4. Under the system component for which you are creating the filter (SYN Flood Protection or Out-of-state TCP Protection), select Create next to the type of filter you want to create: Mitigation Filter: The protection system will drop packets matching the filter expression. For example, if we see too many requests to a destination with the same protocol violation, we can be fairly sure this is an automated script, rather than a surge of requests from a legitimate web browser. By providing multi-layered protection, Cloudflare is able to mitigate a wide variety of DDoS threats. org" as the domain name for this guide. cloudflare. We’ve already covered the former in the blog post How to customize your HTTP DDoS protection settings. {" id ": "31c70c65-9f81-4669-94ed-1e1e041e7b06", Nov 25, 2024 · Key Features of Cloudflare’s DDoS Protection: Always-On Protection: Cloudflare’s DDoS protection is always active, monitoring traffic 24/7. Sep 25, 2017 · Virtually every Cloudflare competitor will send you a bigger bill if you are unlucky enough to get targeted by an attack. com to users with the Super Administrator role on accounts with prefixes advertised by Cloudflare. Create an override for the rule with ID <RULE_ID> and set the rule sensitivity to low. Jan 6, 2025 · Cloudflare is one of the largest internet infrastructure companies in the world, providing CDN services, DDoS protection, DNS management and more to millions of websites. Real-Time Analytics: Detailed insights into attack patterns and mitigation measures. Cloudflare’s free and paid services can be used to improve the security, speed, and availability of a website in a variety of ways. The high capacity makes Cloudflare resistant to even the most powerful attacks. You must add prefixes to Advanced DDoS Protection so that Cloudflare can analyze incoming packets and offer protection against sophisticated TCP DDoS attacks. The following example updates an existing DNS protection rule with ID {rule_id}. Refer to the changelog for more information on recent and upcoming changes. Mar 18, 2021 · Introducing our autonomous DDoS (Distributed Denial of Service) protection system, globally deployed to all of Cloudflare’s 200+ data centers, and is actively protecting all our customers against DDoS attacks across layers 3 to 7 (in the OSI model) without requiring any human intervention. Cloudflare has also mitigated DDoS attacks that featured extremely high packet rates and HTTP request rates. Aug 13, 2024 · When your traffic is proxied through Cloudflare, Cloudflare can automatically stop DDoS attacks from ever reaching your application (and your origin server). Availability Jun 30, 2024 · Cloudflare's HTTP DDoS Protection always kicks in too late, often after a large volume of attacks has hit the origin server before the protection kicks in. The feed aims to help service providers stop the abuse and reduce DDoS attacks originating Cloudflare sends DDoS reports via email from no-reply@notify. Security: Very secure. Advanced DDoS Protection protects the IP prefixes you select from sophisticated DDoS attacks. This means that you do not need to deploy the managed ruleset to the ddos_l7 phase ruleset explicitly. This can create challenges for some enterprises. The example below uses the Update ruleset operation to execute the steps in a single PUT request. Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3. For a list of available API endpoints, refer to Endpoints. However, one of the characteristics of proxying services is that interactions on the web that go to Cloudflare (DNS queries or requests to SaaS providers, for example) will appear to the world as coming from the Cloudflare IP space. The available managed rulesets are: HTTP DDoS Attack Protection. The global coverage and capacity of our network allows us to absorb the largest attacks ever recorded, without manual intervention. A prefix can be an IP address or an IP range in CIDR format. Use case: Mitigate large HTTP DDoS attacks and monitor flagged traffic In the following example, a customer is concerned about false positives, but wants to get protection against large HTTP DDoS attacks. Additionally, if you are a Magic Transit or a Spectrum customer on an Enterprise plan, you can export L3/4 traffic and DDoS attack logs using the Network Analytics logs. For example, Cloudflare is a popular CDN that offers DDoS protection, caching, and security features. Cloudflare Magic Transit is a network security and performance solution that offers DDoS protection, traffic acceleration, and more for on-premise, cloud-hosted, and hybrid networks. Our DDoS systems are great at detecting attacks, but there’s a minor catch. Saved searches Use saved searches to filter your results more quickly For example, Cloudflare’s layer 7 load balancer will also be able to take advantage of other services such as DDoS protection, CDN/Cache, Bot Management, or WAF. DoS utilizes a single connection, while a DDoS attack utilizes many sources of attack traffic, often in the form of a botnet. You define overrides for the Network-layer DDoS Attack Protection managed ruleset at the account level. Location-aware protection is only the first step to making Cloudflare’s DDoS protection even more intelligent, sophisticated, and tailored to individual needs. Configure the Network-layer DDoS Attack Protection managed ruleset by defining overrides in the Cloudflare dashboard. Some of the key benefits of our layered threat defense include: mitigate DDoS attacks of all forms and sizes. With 321 Tbps of network capacity, Cloudflare has mitigated some of the largest DDoS attacks ever recorded, without slowing down performance for customers. When you get access to Advanced DDoS Protection systems, there are no configured thresholds in your account. Oct 23, 2024 · Cloudflare mitigated nearly 6 million DDoS attacks, representing a 49% increase QoQ and 55% increase YoY. Dec 31, 2024 · Cloudflare is a high-performance DDoS protection service that has a network capacity of 30 Tbps, 15x that of the largest DDoS attack ever recorded. Rate Limiting complements Cloudflare’s DDoS protection by allowing for precise mitigation of the most sophisticated attacks against the application layer. In 2024 alone, CloudFlare mitigated over 14. We’ve also added new DNS-centric data points to help customers better understand their DNS traffic patterns and attacks. Last updated: Nov 4, 2024. Learn more about Cloudflare DDoS Protection. protection against Layer 3/4/7 DDoS attacks Cloudflare’s DDoS solution provides comprehensive DDoS protection against Layer 3, 4 and 7 DDoS The Cloudflare Network-layer DDoS Attack Protection Managed Ruleset. Nov 4, 2024 · Cloudflare automatically detects and mitigates distributed denial-of-service (DDoS) attacks via our autonomous DDoS systems. Unmetered DDoS mitigation: Pioneering this approach since 2017 to ensure Internet security, Cloudflare provides unmetered DDoS protection, meaning customers are protected without worrying about bandwidth or cost limitations during attacks.
wycgygt emmd lqkdc hxqru ujgnc timcagn dth lhjk qoez ygdfvb
{"Title":"What is the best girl
name?","Description":"Wheel of girl
names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}