External researchers can’t determine the originating IP addresses for the flood of malicious traffic that hit X’s servers without direct access to X’s systems. (Photo by KIRILL KUDRYAVTSEV/AFP via Getty Images) | CyberScoop