No problems detected.

Incidents in the past 7 days

View full history
  1. Feb 14

    No incidents on this day.

  2. Feb 13

    No incidents on this day.

  3. Feb 12

    No incidents on this day.

  4. Feb 11

    No incidents on this day.

  5. Feb 10

    1. DDoS

      We are currently experiencing a renewed DDoS attack similar to the one observed yesterday, which has impacted service availability. All services were restored after approximately 6 minutes of downtime. We are actively mitigating the attack and continues to implement additional filtering measures to prevent further disruption.

      Update 11 Feb 21:02 CET: The network has been stabilized and all services are fully operational. We have added additional DDoS scrubbing capacity and will continue expanding redundancy over the coming weeks to further strengthen resilience.

  6. Feb 09

    1. DDoS

      We are currently experiencing a DDoS attack that is impacting service availability. Our team is actively mitigating the attack.

      Update 17:17 CET: We are working with our upstream network provider, who has applied additional filtering and increased capacity to reduce the impact.

      Update 18:53 CET: Traffic has stabilized at normal volumes while we continue to aggressively filter traffic. We continue to actively monitor the situation.

      Update 20:05:

      We have successfully migrated all traffic to our fallback network, and service is fully operational.

      Earlier today, our network was targeted by a large-scale volumetric DDoS attack affecting TCP, UDP, and ICMP traffic, peaking at well over many Gbit/s. Our primary upstream provider was unable to fully mitigate this attack, which resulted in redirect availability issues for approximately 55% of total traffic during the incident.

      As part of our design, we operate a secondary network provider in hot-standby mode. We initiated a failover to this network to restore availability. Due to the nature and scale of the attack, additional mitigation steps were required, including the deployment of extra filtering rules and the expansion of mitigation capacity to safely absorb and filter all incoming traffic. Multiple filtering layers are now active, with sufficient headroom to handle continued attack traffic.

      Based on traffic characteristics and indicators observed during the incident, the attack appears consistent with activity associated with the Aisuru botnet. We continue to analyze telemetry in cooperation with our upstream providers.

      We are currently working closely with our network providers to further strengthen our defenses. This includes evaluating pre-provisioned additional capacity, as well as researching additional DDoS mitigation vendors alongside our existing protections.

      While we regularly and successfully mitigate DDoS activity, this was an unusually large and aggressive volumetric attack. We will continue to invest in redundancy and mitigation capacity to reduce the impact of similar events in the future.

  7. Feb 08

    No incidents on this day.