Resolved -
Our team has responded to a DNS reflection spoof attack on one of our VPS hosting nodes. After we have received the alert, within 10-minutes we found the source of the abuse, and suspended the client. Our team will further investigate preventing this in the future.
Thank you for your patience.
Aug 9, 03:55 UTC
Monitoring -
We have placed a null-route in place, which has restored access to NYC KVM-02. Our team is still investigating the abuse occurring. This incident is now resolved, we are monitoring towards resolution. Thank you for your patience.
Aug 9, 03:50 UTC
Update -
We have downgraded this incident to be specific to NYC-02 KVM node. At the moment we are working to investigate the issue.
Aug 9, 03:28 UTC
Investigating -
We are currently investigating this issue.
Aug 9, 03:17 UTC
Resolved -
We will be marking this as resolved as the network has stabilized. Our team will monitor overnight for any inconsistency. Thank you for your patience regarding this. Please check your emails for an RFO regarding todays incident, this will be sent out around noon once we have consulted with our ISPs. Thank you.
Jul 29, 02:55 UTC
Monitoring -
We have temporarily resolved the issue. Network has stabilized. Techs are still investigating. Thank you.
Jul 29, 02:33 UTC
Update -
Our team is still working to resolve latency and network connectivity issues within Dallas. All tier 1 staff have been notified. Thank you for your patience.
Jul 29, 02:15 UTC
Investigating -
the network in Dallas has been showing reports of degraded performance we are currently working on a fix for this
Jul 29, 01:34 UTC