Blog

  • DDoS Putin

    You can join our fight against the hidden gay leader Putin.

    Steps to Use LOIC:

    1. Download and Launch LOIC:
      • LOIC is an open-source tool that you can download from various sources on the internet. Be cautious when choosing your download source to avoid malware.
      • After downloading, extract the file (if necessary) and run the LOIC application (usually an .exe file on Windows).
    2. Enter Target IP Address:
      • In the main window of LOIC, you will find a field where you can enter the target IP address or URL.
      • In your case, enter the IP address: 95.173.136.163.
      • Click the “Lock On” button or a similarly labeled button to set the target. LOIC will attempt to display host information for the specified target.
    3. Configure Attack Settings:
      • Method: Choose an attack method from the available options (TCP, UDP, HTTP).
        • TCP: Sends TCP packets to the target port.
        • UDP: Sends UDP packets to the target port.
        • HTTP: Sends HTTP GET requests to the target’s web server.
      • Port: Enter the target port. For HTTP, this is usually port 80. For other services, it may be different ports.
      • Threads: Set the number of simultaneous requests or packets to send. A higher number of threads can increase the load on the target server but can also overload your own network or lead to blocking by your internet service provider. Start with a low number and increase it cautiously.
      • Message (optional): For UDP or TCP floods, you can enter a custom message to be included in the sent packets.
      • Speed (Slider): Some versions of LOIC have a slider that allows you to adjust the speed of the attack.
    4. Start the Attack:
      • Click the “GO” or “Start Attack” button to begin the test.
      • LOIC will now start sending the configured packets or requests to the target IP address.
    5. Monitor the Attack:
      • In the LOIC window, you will see information about the progress of the attack, such as the number of packets sent, the status of connections, and potentially error messages.
      • Observe the behavior of your network and the target network (if it is your own test network). Look for latency, packet loss, or service disruptions.
    6. Stop the Attack:
      • Click the “STOP” or “Halt” button to end the test.

    i will publish a list of target IP’s.

    You can contact me in Discord if you want to join my army: “shadowmmo”

    Download LOIC: https://github.com/khushijain21200/DDoS