Website - Operational
Website
Client Portal (manage.fullhost.cloud) - Operational
Client Portal (manage.fullhost.cloud)
Control Panel (app.vap.fullhost.cloud) - Operational
Control Panel (app.vap.fullhost.cloud)
SSH Gate (gate.vap.fullhost.cloud) - Operational
SSH Gate (gate.vap.fullhost.cloud)
API - Operational
API
CA-WEST - Operational
CA-WEST
CA-EAST - Operational
CA-EAST
Client Portal (manage.fullhost.com) - Operational
Client Portal (manage.fullhost.com)
Email Hosting (MailWire) - Operational
Email Hosting (MailWire)
Elastic Hosting - Operational
Elastic Hosting
Reseller Hosting - Operational
Reseller Hosting
WordPress Hosting - Operational
WordPress Hosting
Virtual Machines - Operational
Virtual Machines
Elastic Hosting - Operational
Elastic Hosting
WordPress Hosting - Operational
WordPress Hosting
Virtual Machines - Operational
Virtual Machines
Elastic Hosting - Operational
Elastic Hosting
WordPress Hosting - Operational
WordPress Hosting
Virtual Machines - Operational
Virtual Machines
Elastic Hosting - Operational
Elastic Hosting
Reseller Hosting - Operational
Reseller Hosting
WordPress Hosting - Operational
WordPress Hosting
Virtual Machines - Operational
Virtual Machines
Automated Monitoring System - Operational
Automated Monitoring System
Notice history
Dec 2025
- CompletedDecember 12, 2025 at 1:00 PMCompletedDecember 12, 2025 at 1:00 PMMaintenance has completed successfully
- In progressDecember 12, 2025 at 9:00 AMIn progressDecember 12, 2025 at 9:00 AMMaintenance is now in progress
- PlannedDecember 12, 2025 at 9:00 AMPlannedDecember 12, 2025 at 9:00 AM
Following last night's fiber migration, Zayo will be performing additional maintenance work on the dark fiber infrastructure in Vancouver during the above timeframe.
We have confirmed with Zayo that our circuits will not be impacted during tonight's maintenance, as our fiber was successfully moved during last night's window.Expected Impact: None - No downtime or service interruption anticipated.
Due to the incident this early morning, that as well was not to be service impacting, we will be more closely monitoring this maintenance and provide updates if anything changes.
Nov 2025
- ResolvedResolved
We are closing this incident and it appears that CloudFlare has confirmed they are in monitoring status and the incident is resolved from there end.
- InvestigatingInvestigating
Cloudflare is currently experiencing a major global outage, which is impacting websites and online services across the internet. While we do not provide Cloudflare as part of our hosting services, some of our clients independently use Cloudflare for their websites. Those clients may experience downtime or degraded performance as a result of this external issue.
Our own website and client portal were briefly affected because we previously used Cloudflare for edge delivery. However, we had already planned to remove Cloudflare from our technology stack by the end of the year, and due to this incident, we accelerated that transition and have now fully removed Cloudflare from our infrastructure.
If your website is impacted and you are using Cloudflare, removing Cloudflare from your setup may restore normal service until Cloudflare resolves the outage.
For ongoing updates, please refer to Cloudflare’s official status page.
We will continue to monitor the situation and share any relevant updates. Thank you for your understanding.
- ResolvedResolved
Mitigation efforts have been in place for awhile now, with no repeats. But we will be keeping, per the RFO earlier provided, this monitored on our end closely.
- UpdateUpdate
This incident is still ongoing, and we continue to see periods of inaccessibility as we remediate this attack. We thank you for your patience and understanding.
- MonitoringMonitoring
We will continue to monitor for stability.
- ResolvedResolved
RFO to incident today:
Earlier this morning, our network operations team identified a large-scale Distributed Denial of Service (DDoS) attack directed at the reseller hosting server van-rs23.ispcontrol.net. The attack involved a high volume of inbound traffic that resulted in intermittent connection timeouts, increased latency, and degraded performance for hosted sites and associated services.
Upon detection, automated mitigation protocols were engaged, and additional filtering and rate-limiting rules were applied at the edge and upstream levels. Our team worked with our DDoS mitigation partners to analyze and scrub malicious traffic patterns. During the event, legitimate traffic may have experienced short periods of packet loss or timeouts as filtering rules propagated.The attack has since been fully mitigated, and normal service performance has been restored. No data loss or persistent service impact occurred.
Current Status:
Mitigation measures are in place and stable.
Server performance has returned to normal operating parameters.
We will continue enhanced monitoring of the affected network segment to ensure ongoing stability and to detect any potential follow-up activity.
Next Steps:
Our network engineering team is conducting a post-incident review to further optimize DDoS filtering profiles and evaluate additional edge-layer protections. - MonitoringMonitoringWe implemented a fix and are currently monitoring the result.
- IdentifiedIdentified
Connectivity to node is currently under investigation again. Root cause does appear to have been found for flapping, and team is working on incident.
- MonitoringMonitoring
The incident is resolved, and are leaving in monitoring to further review stability.
- IdentifiedIdentified
Our team continues to work on this high priority event, and bring node back online. We thank you for your patience.
- InvestigatingInvestigatingWe are currently investigating this incident.
Oct 2025
No notices reported this month