If attackers can’t get a valid account, then they can’t make requests and consume lots of resources, so in turn can’t disrupt ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible resultsResults that may be inaccessible to you are currently showing.
Hide inaccessible results