fig3_attack-variation-using-other-api-endpoint