This morning some idiot thought his little compromised Wordpress bot net would terrorize a provider. It worked for a few minutes then humans sprung to. Slews and slews of URL requests made at the same time through common WordPress exploitation. This details the common exploit via the Pingback mechanism: http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html In a bit when they tire out and/or run out money, interest or compromised machines, I'll publish all the compromised IPs so others can take proactive stance and get to snipping them too. Open to recommendations on services and sites such compromised sites can be added to for sh!t listing.