Archive.today Script Triggers DDoS-Level Traffic Against Independent Website
Archive.today Script Triggers DDoS-Level Traffic Against Independent Website
An independent investigation has uncovered that archive.today executes a JavaScript loop on its CAPTCHA page that repeatedly sends automated requests to a third-party website — behavior consistent with a sustained DDoS-style traffic attack.
What the Script Does
The code runs automatically and sends repeated background requests to the same website every few hundred milliseconds. Each request uses a randomized parameter to bypass caching, forcing the target server to process every hit.
fetch("https://target-site.example/?q=random");
}, 300);
At roughly 3–4 requests per second per visitor, this behavior can quickly overwhelm small websites, increase hosting costs, and cause outages — matching real-world DDoS impact.
Community Response
After the findings were published, discussions appeared on Hacker News and Reddit, with users reviewing screenshots, traffic behavior, and potential abuse of browser-based visitors as involuntary traffic generators.
Why This Matters
Web archives play an important role on the internet. However, when archival tools generate sustained, automated traffic against live websites, they cross into dangerous territory that can harm site owners and infrastructure.
Comments
Post a Comment