The Conservative Answer to Facebook Attacked by Hackers

Watchdog Wire – Florida received the below information about the launch of  the TEA Party Community website. The website has grown exponentially since it launch on Saturday, February 2nd. As of the posting of this column it has 90,593 members. It is gaining nearly 5,000 new members daily.

Tea Party Community – ATTACKED JUST BEFORE OUR LIVE BROADCAST!

Posted on February 3, 2013.

Earlier this morning (February 2, 2013), Ken Crow (TPC-Co-founder), appeared on the Fox and Friends show announcing the launch of our new website — the FB alternative for conservatives.

As anticipated, the our community experienced a large influx of new members and site traffic. Along with all the new members came hundreds of trolls who sought to disrupt our new rapidly growing community.

Our great team of moderators had their hands full handling over 2,000 reports in just a few short hours. With this much media exposure, we’re bound to be a target of our detractors.”

Tim Selaty Jr. (Co-Founder of TPC) stated:

Just 35 minutes before the scheduled live broadcast of our national launch, the Tea Party Community website experienced a large DOS (Denial of Service) attack. “http://en.wikipedia.org/wiki/Denial-of-service_attack

According to our logs, the attacks came from all around the country including Pakistan, Afghanistan, France, Germany, Russia, and even from the United States. The attack was from a “BotNet”. http://en.wikipedia.org/wiki/Botnet

We ask all of our dedicated Patriots members to hang in there and not lose heart as The Tea Party Community isn’t going away. We’re here to stay.”

Here is the message sent to us from our server provider about the attack:

“Dear Tim:

We have discovered that one of your IP is under DOS attack

Server:

Total Attack Packets Per Second (PPS): 450,000

Your IP is currently the target of a large Denial of Service attack, which leaves us no option but to null route your IP address. The incoming DoS attack was negatively affecting our other customers and our network stability. We have mitigated this attack with a null route (all traffic destined to this IP is dropped), and will be leaving it in place for the next 24 hours. If you would like to remove the null route sooner, simply respond to this ticket and we will remove it and check to see if the attack has subsided. Please note that if the null route is removed early and the attack returns, then another null route will need to be placed.

We are attempting to gather additional details regarding this DOS attack and if successful, we will send a follow up summary report. We apologize for any inconveniences, but we must protect the integrity of our network for all our clients. Please update this ticket if you have any questions.

Thank you and kind regards,

PEER 1 Hosting/Serverbeach Network Operations Center (NOC)”

 – TPC Staff