Archive.today — Reported DDoS-Like Activity & Source Hub

Video demonstrations & community clips

Selected community videos showing the JavaScript running in a browser (these are user-recorded demos, view them on YouTube for original context).

More community videos are linked in the hub below.

Technical explanation, timeline & source hub

How the reported DDoS-like pattern works (plain language)

1) A small JavaScript timer on a page (a `setInterval`) fires repeatedly at a fixed interval (the published report shows ~300ms). 2) Each timer tick assembles a URL that looks like `https://gyrovague.com/?s=randomString` and attempts to issue a request. Because each query string is different, normal caching does not satisfy the request. 3) If many visitors open that CAPTCHA page and the client-side code runs in each of their browsers, the combined effect is many requests per second hitting the target site — that is traffic flooding. 4) For low-budget or small-hosted blogs, repeated requests of this kind can rapidly increase CPU usage, database activity, and bandwidth use, causing slowdowns or outages — effectively DDoS-level pressure in practice.

Reported source: A first-person investigation (Gyrovague) published the code snippet and screenshots documenting the pattern; community threads on Hacker News and Reddit assessed the evidence. See the links in the hub below. (These are reports and allegations; consult the original threads for full context.)

Claims about conduct and ownership (reported)

The reporting author published portions of an email thread and a paste with correspondence, claiming the archive webmaster responded with threats and attempts to pressure/remove the critical post. The author also reports that the archive operator’s identity is opaque, and community commenters have discussed ties and aliases; these discussions are public in the linked threads. All such claims are presented here as reported by those sources.

Quick mitigation notes for site owners

  • Rate-limit search endpoints (return HTTP 429 / 503 for excessive queries).
  • Ignore or serve lightweight cached replies for obviously random query strings.
  • Use a CDN / WAF to absorb or block repeating patterns and implement per-IP or per-referrer limits.
  • Log request patterns (timestamps, UA, referrer) for forensics and abuse reports.

Source hub (direct links)

screenshot 1 screenshot 2 screenshot 3

Simulation of Repeated Request Attack (safe)

Visual simulation only — no network requests will be made. The log shows the same URL pattern reported by the original investigation: https://gyrovague.com/?s=<random>.

Requests/sec
3.33
Total requests
49
Interval (ms)
300
[Simulated log — shows GET lines, e.g. GET https://gyrovague.com/?s=abc123]
6:59:06 PM GET https://gyrovague.com/?s=5h7eb
6:59:07 PM GET https://gyrovague.com/?s=2b9kmuoe
6:59:07 PM GET https://gyrovague.com/?s=mhoyh61j
6:59:07 PM GET https://gyrovague.com/?s=1d7il1
6:59:08 PM GET https://gyrovague.com/?s=r7b
6:59:08 PM GET https://gyrovague.com/?s=560xv
6:59:08 PM GET https://gyrovague.com/?s=csnb
6:59:08 PM GET https://gyrovague.com/?s=7lzkc6
6:59:09 PM GET https://gyrovague.com/?s=v0wx3az
6:59:09 PM GET https://gyrovague.com/?s=4h3lmhs5
6:59:09 PM GET https://gyrovague.com/?s=i9a
6:59:10 PM GET https://gyrovague.com/?s=rd178tc
6:59:10 PM GET https://gyrovague.com/?s=gmv4k9b
6:59:10 PM GET https://gyrovague.com/?s=l3ppjido
6:59:11 PM GET https://gyrovague.com/?s=h8re7
6:59:11 PM GET https://gyrovague.com/?s=qax
6:59:11 PM GET https://gyrovague.com/?s=cyca
6:59:11 PM GET https://gyrovague.com/?s=nh5lfhtt
6:59:12 PM GET https://gyrovague.com/?s=j0lh9
6:59:12 PM GET https://gyrovague.com/?s=r5q
6:59:12 PM GET https://gyrovague.com/?s=k2m60my
6:59:13 PM GET https://gyrovague.com/?s=isby92
6:59:13 PM GET https://gyrovague.com/?s=c48d6
6:59:13 PM GET https://gyrovague.com/?s=63x54
6:59:14 PM GET https://gyrovague.com/?s=r7527mgt
6:59:14 PM GET https://gyrovague.com/?s=jeey5
6:59:14 PM GET https://gyrovague.com/?s=49vh
6:59:14 PM GET https://gyrovague.com/?s=xchhjio
6:59:15 PM GET https://gyrovague.com/?s=gu8tx8l
6:59:15 PM GET https://gyrovague.com/?s=d09
6:59:15 PM GET https://gyrovague.com/?s=tdadr
6:59:16 PM GET https://gyrovague.com/?s=4zcq3
6:59:16 PM GET https://gyrovague.com/?s=d0hrwdo1
6:59:16 PM GET https://gyrovague.com/?s=qpwzv
6:59:17 PM GET https://gyrovague.com/?s=1kilynp3
6:59:17 PM GET https://gyrovague.com/?s=hqsm97v
6:59:17 PM GET https://gyrovague.com/?s=ciueyh6
6:59:17 PM GET https://gyrovague.com/?s=fi2vu9h
6:59:18 PM GET https://gyrovague.com/?s=r1cniam5
6:59:18 PM GET https://gyrovague.com/?s=8oe9ru
6:59:18 PM GET https://gyrovague.com/?s=qoztyl0c
6:59:19 PM GET https://gyrovague.com/?s=11yu1mp
6:59:19 PM GET https://gyrovague.com/?s=t6zgs
6:59:19 PM GET https://gyrovague.com/?s=g1a04
6:59:20 PM GET https://gyrovague.com/?s=z19zq1
6:59:20 PM GET https://gyrovague.com/?s=glntwoia
6:59:20 PM GET https://gyrovague.com/?s=edb
6:59:20 PM GET https://gyrovague.com/?s=p5qhaoi
6:59:21 PM GET https://gyrovague.com/?s=zfin4qv9
Editorial note: This page aggregates public reporting and community discussion. The technical simulation is a visual aid only. Claims about individuals, ownership, or illegal conduct are presented as reported in the linked sources and should be verified independently before being treated as fact.
If you want, I can create a shortened summary card for social sharing, or export the hub links to CSV for distribution.

Comments