EDIT: TBC, here’s the current message seen when refreshing a PF stream:
“Piefed.social is having a denial of service attack. They are being kept at bay for now but could return with a more effective method. Download your community subscriptions so if you need to move to another server it’ll be painless - with a few clicks you’ll be seeing all the same content as before. See list of alternate servers at here or here.”
Possible causes?
- Fellow instance that got PO’d somehow? (seems like a major stretch)
- Just random hackers havin’ fun?
- Reddit or similar, targeting one of the top growing instance softwares in ActivityPub / FV? EDIT2 : the timing certainly seems to fit for the recent influx of users coming from Reddit. (see comments)
- Some right-wing entity, not happy about the general rational / left bias to the instance?
- Other…?
In any case, much thanks to our instance runner and dev for fending off the first wave(!) Hope everything is backed up and possible to be restored if the worst happens.
(seriously, what a shitty way to be repaid for doing a great, ongoing job for the community and FOSS)
Seems accessible to me (Europe)
Top of the PF.S stream:
Piefed.social is having a denial of service attack. They are being kept at bay for now but could return with a more effective method. Download your community subscriptions so if you need to move to another server it’ll be painless - with a few clicks you’ll be seeing all the same content as before. See list of alternate servers at here or here.
Sounds a bit concerning to me.
very intermittent for me. I think swell of new users like me + corporate interference to a new competitor
DDOS is a very specific kind of attack, as I understand it, involving overwhelming a server with rubbish packets.
Its a type of attack. Use malware infected computers (botnet) to flood servers woth fake requests. Its a networking traffic jam, where each car has been mind controlled into blocking the route by a nefarious actor. Could be a company paying someone, could be a lone hacker, could be north korea, russia, a wayward child genius, some MIT students making a point. Who knows? Not me. But ddos doesnt just happen randomly, someone has to hit the button. So could be a ddos or just loads of new users creating the jam or ai scrapers. I dont know. I wouldnt be surprised if a few unscrupulous companies want to nip this decentralised threat to their business model in the bud. But then I wouldnt be surprised if a relatively small “site” is just suffering because its user base has doubled in 3 days.
“Yup” to just about all that, altho note that the dev / instance runner himself ID’d it as a DDOS attack.
…its user base has doubled in 3 days.
Really? That might explain why my communities’ subscriber base took off this week. Do you know what happened to double the base?
Effective reddit advertising
Beautiful. Know where that happened?
BuyfromCanada, Degoogle, buyfromEU
Check here, these were the posts made !fedibridge@lemmy.dbzer0.com
They got 800,000 views between them
yes its DDOS, but in my comment i meant its nefarious but new influx certainly won t help.
Is putting a Web Application Firewall (WAF) in front of it not an option? Cloudflare offers it for free for static sites: https://www.cloudflare.com/lp/dg/product/ddos/
There are other hosting providers that offer it as a basic service. This way, the flooding packets are filtered before they even reach the server.
KrebsOnSecurity has been hit a few times with massive DDOS attacks: https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/
Well that explains the
503 Service Temporarily Unavailable
Its leon, hes mad that he has only bots in twitter
Just an update on this front, server load is stable right now as I type this after rimu did some stuff on the server to help. It’s pretty clear this was a DDOS and not a rogue AI scraper because it was hitting the same url many times a second instead of crawling tons of urls like a scraper bot would.
We’ll keep an eye on things. Thanks for your patience.
AI bots will sometimes get stuck requesting the same URL over and over again for no reason. Make sure you check the user agent of the requests.
Most scrapers pretend to be normal browser agents
It happened shortly after that rather strange guy I had to pacify earlier lol
Where was that? 👀
In television@piefed.social
I was discussing/debating with a user. Suddenly he thought i blocked him as he couldn’t reply (I assume) and he reported me to myself and started changing all of his comments to "skavau is a clown, despite me telling him I had not blocked him
He was a local account so I yeeted him, shortly after Piefed goes down
If that’s the case, there’s a good chance this individual is of a low IQ, and decided to DDoS PS as a result of that. Yikes.
Oh wow
Thanks to everyone for all your hard work!
I realized that I replied from the wrong browser tab. I can confirm that this is not some impersonator wjs018 🕵️
Have you done any geolocation checking on the IPs? That might start to paint a better picture of the actor(s) behind the attack.
It’s a good question…for rimu. I have ssh access to do things like restart the server or roll out a critical bugfix or something like that, but my sysadmin skills are not the best.
I’ll ask him later when, hopefully, things will have had some time to cool down.
All you need is to have the IP addresses. If you can extract them, then the rest can be done by saying
whois ip.ad.re.ss(where you put some numbers between 0 and 255 instead of ip, ad, re and ss.)Unless they’re on a VPN…
A whois will likely not do much. It’ll turn out to be some large ISP, which rents out virtual servers and all kind of stuff to private people, companies and VPN providers. And that’s regularly how far you’ll get, a name if a large company. And you can then decide if it’s worth to take someone to court, somewhere abroad… (But sometimes an email to their abuse contact helps a bit. Judging by my experience they won’t ever answer. But sometimes it’ll miraculously stop. And most of the time nobody cares about a single complaint.)
Would the Network Security Toolkit have anything that could help?
I would imagine if they’re on a VPN, which they honestly probably are, then there’s not really a way to track them down at all…
Well, I guess if they’re still online and do silly stuff, like not use a VPN, not have a Firewall installed on their computer… Or they re-use the VPS which also has their personal blog on it… There would be ways to do something. But that’s all very unlikely.
I mean the
whoisis a good idea. Admins will usually want to know what they’re dealing with, and where it’s coming from. But the rest of the steps really depend on how bored an admin is. The best course of action regularly is to block it and move on. There’s so much bad stuff hammering the average webserver anyway. Launching a counterattack is a bit illegal, so that might not be an option. And if some admin has a few hours to pass until it’s 5pm and time to head home, or do it as a hobby and have time to spare they might investigate. I’ve found some hacked servers that way, wrote a few emails. But in practice, 99% of the time there isn’t anything to accomplish.
Is it really a DDOS or piefied just unable to handle an influx of users? Does piefed scale horizontally? Is it async? Does it spawn a thread per request or does it work from a thread/process pool?
Without having looked at the code, my suspicion would be rather that it can’t handle thousands of users concurrently and just 20k users trying to use it at the same time looks like DDOS. Piefed is probably nowhere near v1 or has never been tested for performance.
I’d much rather see some evidence for a DDOS e.g a graph showing number of connections to the server, a graph of response time, number of database connections, of something. Just saying “DDOS” when it might just be the software struggling to keep up with legitimate users seems questionable.
P.S this isn’t a slight at the piefed devs - performance is usually the last thing on someone’s mind who just wants to ship things quickly. Especially with such a demanding and uneducated public that doesn’t understand these are unpaid individuals contributing, not paid workers working on the code 9-5, 5 days a week, 50 weeks a year.
Piefed.social was busier specifically 2-3 days ago and this did not happen.
Definitely not normal traffic.
I’m unstable but i’m not that unstable. If I get pissed off I just write bad music you don’t gotta worry about me. Think of me like Taylor Swift with the 7 Assholes
wait hold on i’m gonna use that as an album
Think of me like Taylor Swift with the 7 Assholes
Dunno what that means, but you got me chortlin’. 😁
I mean most likely answer these days is always AI scraper bots.
It its all one url from many different ips that dont really go anywhere, then its probably just regular old DDOS. If your successful, at some point you get them.
I hate to say it but cloudflare has “fixed” this issue a while back and is one of the better solutions. Which of course sucks because it becomes another layer on top of infa that has gone down in the past.
All the fun of being a sys admin :)
Wouldn’t that tend to show up to the host as such, or as temporarily increased general activity?
DDOS is a very specific kind of attack, as I understand it, involving overwhelming a server with rubbish packets.
DDOS attacks and AI scraper bots are technically indistinguishable. Both are just crippling the server by making an absurd number of requests.
Okay, that’s interesting. Note however that the instance runner specifically ID’d this as a DDOS attack. See copy of their message in side-comment here.
I don’t see anything except an absolutely massive image of some sort of warning symbol. What is a “side-comment”?
Sorry, I wish I hadn’t uploaded that. The silly image is relatively tiny, but got blown up. Anyway, so you can’t see the other comments in this thread? Are you hitting it from an app?
EDIT: I’ve copy-pasted it in to the main post.
















