FullHost - Notice history

All systems operational

Website - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.69%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Client Portal (manage.fullhost.cloud) - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Control Panel (app.vap.fullhost.cloud) - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

SSH Gate (gate.vap.fullhost.cloud) - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

API - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

CA-WEST - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

CA-EAST - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Client Portal (manage.fullhost.com) - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Email Hosting (MailWire) - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Elastic Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 99.71%
Oct 2025
Nov 2025
Dec 2025

Reseller Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.28%Dec · 99.72%
Oct 2025
Nov 2025
Dec 2025

WordPress Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 99.72%
Oct 2025
Nov 2025
Dec 2025

Virtual Machines - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 99.71%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Elastic Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.85%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

WordPress Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.85%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Virtual Machines - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.85%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Elastic Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.92%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

WordPress Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.92%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Virtual Machines - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 99.92%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025
100% - uptime

Elastic Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Reseller Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

WordPress Hosting - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Virtual Machines - Operational

100% - uptime
Oct 2025 · 100.0%Nov · 100.0%Dec · 100.0%
Oct 2025
Nov 2025
Dec 2025

Automated Monitoring System - Operational

Notice history

Dec 2025

Vancouver Data Center - Fiber Infrastructure Maintenance - Non Service Impacting
  • Completed
    December 12, 2025 at 1:00 PM
    Completed
    December 12, 2025 at 1:00 PM
    Maintenance has completed successfully
  • In progress
    December 12, 2025 at 9:00 AM
    In progress
    December 12, 2025 at 9:00 AM
    Maintenance is now in progress
  • Planned
    December 12, 2025 at 9:00 AM
    Planned
    December 12, 2025 at 9:00 AM

    Following last night's fiber migration, Zayo will be performing additional maintenance work on the dark fiber infrastructure in Vancouver during the above timeframe.


    We have confirmed with Zayo that our circuits will not be impacted during tonight's maintenance, as our fiber was successfully moved during last night's window. 

    Expected Impact: None - No downtime or service interruption anticipated.

    Due to the incident this early morning, that as well was not to be service impacting, we will be more closely monitoring this maintenance and provide updates if anything changes.

    https://status.fullhost.com/cmj14znbn05327bmjma4jhze8

Vancouver Data Center
  • Postmortem
    Postmortem

    Post-Incident Follow-Up: Vancouver Data Center Outage - December 11, 2025


    We want to provide you with additional information regarding this morning's network outage affecting our Vancouver Data Center.

    What Happened

    Our upstream provider experienced an unexpected failure affecting multiple fiber paths between Cologix VAN3 and Harbour Center. These paths are designed to be fully redundant and geographically diverse, and should not fail simultaneously. The outage was triggered by emergency maintenance activity involving the relocation of a segment of dark fiber by the fiber provider, which unexpectedly impacted both redundant circuits.

    Our Commitment Moving Forward

    We sincerely apologize for this disruption to your services. We understand the trust you place in us to keep your operations running smoothly, and we take this responsibility seriously.


    Both FullHost and our upstream provider will be conducting comprehensive post-incident reviews to fully understand how both supposedly diverse fiber paths were affected simultaneously. Based on these findings, we will be implementing additional safeguards, which will likely include:

    • Adding additional diverse fiber paths between Cologix VAN3 and Harbour Center

    • Enhanced monitoring and alerting for upstream connectivity

    • Improved communication protocols with our fiber providers regarding maintenance activities

    Next Steps

    We are committed to transparency throughout this process. Once our joint review is complete, we will share a detailed root cause analysis and the specific improvements we're implementing to prevent similar incidents.
    Thank you for your patience and continued trust in FullHost. If you have any questions or concerns, please don't hesitate to reach out to our support team

  • Resolved
    Resolved

    Partial connectivity has been restored. We will be continuing to monitor as well as getting more information from the upstream provider and share information with you accordingly when it's available.

  • Update
    Update

    Our upstream provider currently has a technician on site and is working to migrate services to an alternate fibre path. This should allow for partial connectivity to be restored while full repairs continue.

    We will continue to keep you posted on this incident and will share information as it becomes available to us.

    Thank you for your patience as we continue to work toward resolving this incident.

  • Update
    Update

    We are continuing to work closely with our fibre provider to restore connectivity. Please rest assured that this remains our highest priority and all teams are actively engaged.

    We will provide additional updates as soon as more information becomes available.

  • Identified
    Identified

    This is from our upstream provider on the incident:

    Approximately 30 minutes ago we were notified by our fibre provider of an emergency maintenance activity involving the relocation of a segment of their dark fibre.

    At this time, we are experiencing outages on multiple fibre paths that are designed to be fully redundant and geographically diverse. These paths should not be impacted simultaneously, and we are actively investigating with the provider to understand why both circuits are currently down.

    We are pushing for immediate restoration of service and will provide further updates as soon as more information becomes available.

  • Update
    Update

    We are continuing to investigate with our upstream providers for an update.

  • Investigating
    Investigating

    We are currently investigating network connectivity to the Vancouver Data Center. Investigating

Nov 2025

Toronto Data Center
  • Postmortem
    Postmortem

    We experienced a temporary network reachability issue affecting the IP range 162.223.224.0/21. A configuration update caused some external networks to temporarily lose access to this range.

    What Happened


    At 3:32 PM ET, we enabled an RPKI security setting intended to improve routing security. The change contained an error that caused some networks around the world to reject traffic to our IP range.

    We identified the issue quickly and rolled back the change at 3:43 PM ET. However, some providers had already cached the incorrect routing information, which delayed full recovery.

    Resolution

    Recovery began immediately after the rollback. Most networks had restored connectivity by 4:10 PM ET, with full global recovery shortly after.

    What We’re Doing to Prevent This

    We are reviewing our deployment and validation processes to ensure similar issues do not occur again. Additional safeguards will be implemented before making future routing-related changes.

    We sincerely apologize for the disruption and appreciate your patience while we resolved this issue.

  • Resolved
    Resolved

    This incident has been resolved.

  • Monitoring
    Monitoring

    Network connectivity is begin to recover across most networks now, and a full recovery should be expected soon.

  • Investigating
    Investigating

    We are experiencing intermittent connection issues from some networks. We are working to resolve this as a high priority. More information to come.


Cloudflare Global Outage Impacting Services
  • Resolved
    Resolved

    We are closing this incident and it appears that CloudFlare has confirmed they are in monitoring status and the incident is resolved from there end.

  • Investigating
    Investigating

    Cloudflare is currently experiencing a major global outage, which is impacting websites and online services across the internet. While we do not provide Cloudflare as part of our hosting services, some of our clients independently use Cloudflare for their websites. Those clients may experience downtime or degraded performance as a result of this external issue.

    Our own website and client portal were briefly affected because we previously used Cloudflare for edge delivery. However, we had already planned to remove Cloudflare from our technology stack by the end of the year, and due to this incident, we accelerated that transition and have now fully removed Cloudflare from our infrastructure.

    If your website is impacted and you are using Cloudflare, removing Cloudflare from your setup may restore normal service until Cloudflare resolves the outage.

    For ongoing updates, please refer to Cloudflare’s official status page.

    We will continue to monitor the situation and share any relevant updates. Thank you for your understanding.

    https://status.fullhost.com/cmi4jmbri009o14hyhcof57vs

van-rs23
  • Resolved
    Resolved

    Mitigation efforts have been in place for awhile now, with no repeats. But we will be keeping, per the RFO earlier provided, this monitored on our end closely.

  • Update
    Update

    This incident is still ongoing, and we continue to see periods of inaccessibility as we remediate this attack. We thank you for your patience and understanding.

  • Monitoring
    Monitoring

    We will continue to monitor for stability.

  • Resolved
    Resolved

    RFO to incident today:

    Earlier this morning, our network operations team identified a large-scale Distributed Denial of Service (DDoS) attack directed at the reseller hosting server van-rs23.ispcontrol.net. The attack involved a high volume of inbound traffic that resulted in intermittent connection timeouts, increased latency, and degraded performance for hosted sites and associated services.


    Upon detection, automated mitigation protocols were engaged, and additional filtering and rate-limiting rules were applied at the edge and upstream levels. Our team worked with our DDoS mitigation partners to analyze and scrub malicious traffic patterns. During the event, legitimate traffic may have experienced short periods of packet loss or timeouts as filtering rules propagated.

    The attack has since been fully mitigated, and normal service performance has been restored. No data loss or persistent service impact occurred.

    Current Status:

    • Mitigation measures are in place and stable.

    • Server performance has returned to normal operating parameters.

    • We will continue enhanced monitoring of the affected network segment to ensure ongoing stability and to detect any potential follow-up activity.

    Next Steps:
    Our network engineering team is conducting a post-incident review to further optimize DDoS filtering profiles and evaluate additional edge-layer protections.

  • Monitoring
    Monitoring
    We implemented a fix and are currently monitoring the result.
  • Identified
    Identified

    Connectivity to node is currently under investigation again. Root cause does appear to have been found for flapping, and team is working on incident.

  • Monitoring
    Monitoring

    The incident is resolved, and are leaving in monitoring to further review stability.

  • Identified
    Identified

    Our team continues to work on this high priority event, and bring node back online. We thank you for your patience.

  • Investigating
    Investigating
    We are currently investigating this incident.

Oct 2025

No notices reported this month

Oct 2025 to Dec 2025

Next