Sophisticated attackers will use reflected attacks - bombarding a very chatty third party service or protocol with forged packets, signing your domain as the reply address. Your site will get flooded with the responses.