An Update on Today’s DNS Outage: A Message From Our CEO

As a recursive DNS resolver, we take any incident or perceived outage very seriously as a company. We know that you rely on us to be highly available as your DNS provider and DNS security. We recognize DNS is a critical aspect of your infrastructure, and for our MSP partners, that of your customers as well.

On Thursday January 13th at 20:08pm UTC and again on Tuesday, January 25th at 14:33 UTC, we began to receive tickets from users in the Northeastern United States stating they were experiencing DNS timeouts. Based on our monitoring, it seems that just under 1% of our network was impacted. Our network monitoring also showed a BGP route peering change which was shifting a heavy volume of DNS traffic to our nodes in Eastern Europe. The initial form of notifications to our customers was posted on our status page.

Our engineers discovered the root cause was a provider that made an upstream peering change. In both incidents, we immediately stopped advertising to that node and restored traffic right away. Service was completely restored by 20:27 UTC and 14:47 UTC, respectively.

When we select service providers and begin the process of deploying new anycast nodes, we tune our BGP advertisements and blocks based on the network paths which give our customers the best experience. In this particular case, our provider added a new peering connection that introduced routing changes that negatively impacted some of our customers. In response, we removed that node from service until we could fully understand the change and tune our BGP advertisements. We are actively improving our observability to detect and respond to these types of changes more quickly, ahead of any customer impact.

We will further vet this new provider to ensure they’re truly able to meet our SLAs. We hold our providers to a very stringent process—any providers unable to meet our SLAs will be eliminated from the DNSFilter network.

I sincerely apologize to our customers for this inconvenience, especially all those impacted. We remain highly committed to operating a reliable and innovative platform that you can trust.

Sincerely, 

Ken Carnesi
Founder & CEO


Search
  • There are no suggestions because the search field is empty.
Latest posts
Trends of Cybersquatting, Typosquatting, and Other Malicious Domains Trends of Cybersquatting, Typosquatting, and Other Malicious Domains

The Growing Threat of Malicious Domains in Cybersecurity

As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...

The DNS-Based Threats Your Firewall Ignores The DNS-Based Threats Your Firewall Ignores

Your firewall is working hard… but not smart. And cybercriminals love that.

Like a bouncer at the club with a clipboard—great at stopping the obvious troublemakers that aren’t on the list, but completely oblivious to unknown threats. They excel at blocking unauthorized access through known ports and protocols, but they often overlook a critical vulnerability: DNS traffic and what’s on the other side of a link. This oversight allows cybercrimina...

AI vs AI: Using DNS to Combat Sophisticated Cyberattacks AI vs AI: Using DNS to Combat Sophisticated Cyberattacks

Introduction: The AI Cybersecurity Arms Race

Artificial intelligence (AI) has transformed the cybersecurity landscape—both for defenders and attackers. While AI-powered cybersecurity solutions offer advanced threat detection, AI-driven cybercrime is evolving at an alarming rate, automating attacks that are more sophisticated, evasive, and dangerous.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.