Archive.today Under Fire: Allegations of JavaScript-Driven DDoS-Like Traffic

INVESTIGATION

Archive.today Under Fire

Reported JavaScript behavior, DDoS-like traffic patterns, and serious allegations surrounding one of the world’s largest archive services.

What Is Being Reported

According to multiple public discussions and technical investigations, a CAPTCHA page served by archive.today has been observed running JavaScript that repeatedly generates outbound HTTP requests.

These requests use randomized query strings (for example ?s=random) and repeat at a fixed interval, a pattern that security professionals often associate with DDoS-style traffic flooding.

Why This Is Unusual

  • Archive.today is one of the largest web archiving services in the world
  • The code reportedly runs on the client side, meaning visitors unknowingly generate traffic
  • Targets are not the archive itself, but external blogs
  • The behavior continues as long as the page remains open

Simulation of Repeated Request Attack (Safe)

This is a visual simulation only. No real requests are sent.

Total Requests
0
Interval
300ms

Allegations About Control & Conduct

Public discussions claim that archive.today is operated by an anonymous individual reportedly based in Russia. Some sources further allege harassment, blackmail attempts, and abusive behavior. These claims are unproven and are reported here strictly as allegations, with sources provided below.

Important: No claims of government involvement are proven. References to geopolitical connections come solely from public speculation and should be treated with caution.

Video Evidence & Analysis

Sources

  • Gyrovague investigation
  • Hacker News discussion
  • Lobsters thread
  • Reddit DataHoarder discussion

Comments