The DOS attack against our nameservers resumed at approx. 5:15am EST this morning. At present ns1.easydns.com and remote1.easydns.com are being null routed by shaw but are up and visible to everyone else. Prolexic is working on mitigating the attack on ns2, remote1 and ns3 and we expect to hear back from them soon.
Update on status of nameservers
For the most part, things have levelled out on the DOS attack. Again, I note that most of the pain was felt by members using third party registrars who didn’t have the full 6 nameservers in their DNS delegation. Status as follows, all servers are functioning normally except certain parts of the net may have […]
DOS attack intensifies
With apologies for not posting earlier about this, but this morning the DOS attack expanded to all of our nameservers, however we have managed to maintain DNS availability. So far every single customer who has reported a problem with DNS availability over the course of the DOS attack has, upon inspection of their domain’s nameserver […]
Dos Attack
This morning we experienced a DoS attack directed against our DNS infrastructure. We have been working with our various providers to quell the attack and keep easyDNS services online. Currently all services are online and responding. Some customers may experience issues using ns6.easydns.net , as our Rackspace datacenter has taken measures which null routed the […]
Update on DOS attack
This morning’s DOS attack was directed against ns1.easydns.com and is an ongoing event. Some upstream networks from our Q9 datacenter (Toronto) are enacting counter-measures which will render NS1 unreachable to users on the other side of those networks (examples are Teleglobe and Cogent). The rest of the nameservers (Miami, Phoenix, Texas, Toronto2 and London, UK) […]
DoS Attack.
We are currently experiencing a DoS attack against our DNS and Email infrastructure. The nature of the attack has been identified and we are working with our providers to restore all easyDNS services. We do apologize for the inconvenience.