Server is currently down due to a DDoS attack.
The site is returning a text dump while we investigate. Below is raw output and assorted fragments.
-- connection-pool::status
active: 432
waiting: 1298
avg-latency-ms: 241.7
packet-loss-estimate: 0.71
note: sandboxed-log-echo
// simulated stacktrace (for display only)
at network::ingest (ingest.cpp:227)
at throttle::spill (throttle.go:88)
at main (server.js:102)
Error: excessive-connections - dropped
at acceptConnections (conn_listener:45)
at processIncoming (dispatcher:130)
----- HTTP/1.1 503 Service Unavailable -----
Date: Thu, 02 Oct 2025 18:00:12 GMT
Server: faucher-lemieux/1.2.3
Retry-After: 3600
Content-Type: text/plain
X-Debug-ID: 7f3b2a1c-9d4e-4e2b-8a1f-e2f3c3a9b12c
----- END HEADERS -----
# random hex blob
4f6b2d1c 00ffab9e 77b1c3d2 9a1b2c3d
a1b2c3d4 e5f6a7b8 c9d0e1f2 33445566
# base64 snippet (nonfunctional sample)
QmFzZTY0IGR1bW1pZXMgYW5kIGJhZGx5IGRhdGEgLSBub3QgcmVhbC1jbGFzc2lj
/* random CSS fragment */
:root { --fault-color: #ff5c5c; --bg: #0b0f14; }
body.unavailable > header { display: none; }
@media (max-width: 600px) { .notice { font-size: 16px; } }
[server]
name = "faucher-lemieux:us-branch"
mode = "degraded"
max_clients = 200
observed_clients = 18432
throttle_enabled = true
[network]
inbound_rate = "spike"
ddos_signature = "tcp-syn-flood-v2"
mitigation = "enabled - heuristics only"
# javascript-ish pseudo
function handleIncoming(req) {
// intentionally non-functional - display only
if (req.source === 'unknown' && req.rate > 1000) {
drop(req);
} else {
queue(req);
}
}
>>> syslog tail (sample)
Oct 02 17:58:12 srv-01 kernel: [warn] SYN flood detected from 198.51.100.0/24
Oct 02 17:58:12 srv-01 kernel: [info] ratelimit applied
Oct 02 17:58:13 srv-01 firewall: reject UDP from 203.0.113.45
Oct 02 17:58:14 srv-01 auth: worker spawn failure - retrying
# JSON fragment (display-only)
{
"incident": {
"id": "INC-20251002-774",
"type": "ddos",
"state": "investigating",
"first_detected": "2025-10-02T17:45:03Z",
"reported_by": "automated-monitor"
},
"notes": [
"traffic spike - synthetic",
"mitigation in progress",
"contact: ops-team@example.com"
]
}
-- assorted protocol samples --
> SSH-2.0-OpenSSH_8.4p1 Ubuntu-5ubuntu1
> GET /healthcheck HTTP/1.1
> POST /api/v1/ingest HTTP/1.1
> SYN-FLOOD x1000000
# misc code crumbs
SELECT * FROM connections WHERE state = 'waiting' LIMIT 20;
-- end of dump
note - this page is for human viewing. No troubleshooting commands or instructions are provided here.
If you are the site owner and need to contact operations, email ops-team@example.com
If you need to replace the text, edit the file and keep the first line intact - it is the intended notice.