Inside the archive.today DDoS Allegations: How Client-Side Code Can Flood a Blog

archive.today and Alleged DDoS Abuse: A Step-by-Step Breakdown

Reported behavior • Client-side request flooding • Source-documented allegations

Multiple independent reports and code analyses have raised concerns about client-side JavaScript running on archive.today that repeatedly generates requests to third-party blogs. Researchers and site owners describe this pattern as consistent with a DDoS-style traffic flood.

How the Alleged DDoS Mechanism Works

  1. A visitor opens an archive.today page (often a CAPTCHA page).
  2. JavaScript executes automatically in the browser.
  3. A timer repeatedly generates URLs like:
    https://gyrovague.com/?s=randomString
  4. Each request bypasses caching, forcing a fresh server response.
  5. As long as the tab stays open, requests continue.
Why this is unusual: archive.today is one of the largest archive services on the internet. Observers say it is highly unusual — and alarming — for any major archive platform to run code that appears to direct sustained traffic at unrelated blogs.

Simulation of Repeated Request Attack (Visual Only)

Total Requests
0
Interval
300 ms


Ownership and Controversy (As Reported)

Discussions on Hacker News, Lobsters, Reddit, and published correspondence describe archive.today as being operated by an anonymous Russian individual. These sources also document allegations of harassment and attempted blackmail, including threats to publish defamatory material.

These claims are allegations reported by third parties and are linked below for transparency.

Video Evidence

Sources

  • Gyrovague investigation
  • Hacker News discussion
  • Lobsters thread
  • Reddit DataHoarder discussion
  • Published correspondence archive

Comments