This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is.
Post
Danny Moore
moore.bsky.social
did:plc:7awhblnnwfwtadyfudysrupy
DDoS attacks frequently use compromised or otherwise co-opted IP addresses. The global distribution helps avoid geofencing defenses.
Public high-confidence attribution takes time and effort. So take any quickfire claims with healthy skepticism.
[contains quote post or other embedded content]
2025-03-10T21:29:40.362Z