archive.today Allegedly Uses Browser-Based DDoS Against Personal Blog

archive.today Alleged Browser-Based DDoS – February 2026

Safe reconstruction and visualization of the reported CAPTCHA-triggered repeated request pattern. All claims are based on publicly reported sources.

Incident Overview

February 2026 Alleged Attack

In early February 2026, reports surfaced that archive.today allegedly used its CAPTCHA page to execute JavaScript code that caused visitors' browsers to send randomized search requests every 300ms to a target URL. The reported target was a blog post by gyrovague.com, investigating archive.today operators.

Observers suggested this may have been retaliation for a 2023 OSINT investigation linking archive.today contact info to cybercrime-related domains. It is important to note that this concerns archive.today (.is, .ph, .li) and not Internet Archive (archive.org), which experienced separate DDoS incidents in 2024.

Users have reported infinite CAPTCHA loops and DNS conflicts, possibly related to the JavaScript behavior.

Simulation of Repeated Request Attack (Safe)

This simulation does not send any real network requests. It visualizes the reported repeated request pattern for educational purposes.

300 ms
Requests/sec0.00
Total requests0
[Simulation log — simulated GET lines appear here]

Sources

Comments