We were under a DDoS attack on January 26, 2020. We received 4,935,580 HTTP requests in 3 minutes from the 2 IPs 188.8.131.52 and 184.108.40.206. It was the second DDoS attack – the last one was on September 19, 2019.
You can see the spike clearly in the monthly usage statistics below. The attack was not successful and was only discovered when creating monthly usage statistics.
May 2020: New dorks website, Tor, DDoS test and a Europol takedown Our dataset continues to grow significantly: 17,660,962,195 selectors In the past few months, we have invested in 200+ TB of enterprise storage which allows us to scale up data collection even more. As for the public web, we are currently crawling these TLDs:
On Sunday, May 10, 2020, we will DDoS our own website, intelx.io. We will live tweet and update this blog post with any developments and the outcome. The attack will be executed in the same fashion as an actual attack: we’ll do some research, then pay a shady DDoS provider in Bitcoin (and hope they
Tor .onion domains are the hashes of public keys. Generally, they look random, but it is possible for am Tor hidden service operator to generate onion domains that start with a human readable part such as “silkroad7rn2puhj.onion”. Those are called “vanity onion addresses” and there are tools like Shallot and Eschalot that will create the