Last updated at Wed, 26 Jul 2017 17:41:23 GMT
It looks like our little DDoS buddy got sent home from school early today -- the flood started up again, this time ignoring the DNS name for the metasploit.com web site and instead targeting both IP addresses configured on the server. While SSL service is still unaffected (including Online Update over SVN), folks who wish to visit the Metasploit web site will need to do so using an alternate port until we roll out the next countermeasure.
We also host the main web server for Attack Research, which can now be accessed at:
Thanks for your patience,