Last updated at Fri, 12 Jan 2024 01:27:59 GMT

It looks like our little DDoS buddy got sent home from school early today -- the flood started up again, this time ignoring the DNS name for the web site and instead targeting both IP addresses configured on the server. While SSL service is still unaffected (including Online Update over SVN), folks who wish to visit the Metasploit web site will need to do so using an alternate port until we roll out the next countermeasure.


We also host the main web server for Attack Research.

Thanks for your patience,