Archive.today CAPTCHA Generates Sustained DDoS Traffic: Evidence & Impact

Archive.today CAPTCHA Generates Sustained DDoS Traffic: Evidence & Impact

Investigation · February 2026

A direct inspection of archive.today shows its CAPTCHA page running a script that repeatedly sends automated requests to a third-party blog every 300 milliseconds — a traffic pattern consistent with sustained DDoS-level behavior.

What Is Happening

When a visitor lands on the archive.today CAPTCHA page, their browser automatically begins sending repeated requests to a specific blog’s search endpoint. These requests continue as long as the CAPTCHA page remains open.

For non-technical readers: this means the page quietly tells your browser to contact another website about three times per second, nonstop.

The Script (Plain Explanation)

A small loop runs every 300 milliseconds and asks the target blog
for a new search result using random text, preventing caching.

Because each request is slightly different, the target site cannot reuse cached results. This forces the server to work harder on every hit.

Why this is serious:
Sustained traffic at this frequency can overwhelm small or independent websites, slow them to a crawl, or cause outages — which is exactly how many real-world DDoS attacks operate.

Impact on Small Websites

Large platforms may absorb this load without notice. Personal blogs, indie sites, and low-resource hosts often cannot. Even a few visitors sitting on the CAPTCHA page can multiply the traffic into a continuous attack stream.

Public Discussion & Evidence

The behavior has been documented with screenshots and code and discussed widely across the security community, including Hacker News and Reddit. These discussions focus on responsibility, unintended abuse, and the risks of client-side traffic generation.

Sources

Comments