CyberFOX Outage History

CyberFOX is up right now

There were 3 CyberFOX outages since February 18, 2026 totaling 2h 41m of downtime. Each is summarised below — incident details, duration, and resolution information.

Source: https://status.cyberfox.com

Minor April 18, 2026

[DNS] Investigating issue - Resolution Issues with Latest Version

Detected by Pingoru
Apr 18, 2026, 08:23 AM UTC
Resolved
Apr 17, 2026, 08:23 AM UTC
Duration
Affected: Resolver (us-east-1, us-west-2, eu-west-2, ap-southeast-2)Upstream (us-east-1, us-west-2, eu-west-2, ap-southeast-2)
Timeline · 2 updates
  1. investigating Apr 15, 2026, 05:59 PM UTC

    We are currently investigating reports of resolution issues affecting some users who have updated to our latest version or are deploying the new version of our DNS Client, specifically when attempting to access certain sites that were previously blocked. Our team is actively working on a solution to ensure uninterrupted access for all users

  2. resolved Apr 20, 2026, 08:23 AM UTC

    We identified an issue affecting some users running the latest version of our DNS Client when accessing certain sites that were previously blocked. This behavior was linked to recent changes in upstream load balancing behavior during the handling of HTTP/2 to HTTP/1.1 traffic, including differences in how headers and compression are processed and forwarded between services. The agent now operates with both formats and compression strategies in our load balancer and edge environments. With this update, resolution behavior has been restored and access should now be functioning as expected.

Read the full incident report →

Notice March 24, 2026

Intermittent DNS Resolution Issues Affecting a Subset of Desktop Clients

Detected by Pingoru
Mar 24, 2026, 06:00 PM UTC
Resolved
Mar 23, 2026, 05:00 PM UTC
Duration
Timeline · 2 updates
  1. resolved Mar 24, 2026, 06:00 PM UTC

    Update on Brief DNS Disruption from 3/23/26 from ~12:45 - 1:15 PM We wanted to share a brief update regarding a short‑lived DNS issue that occurred on Monday, 3/23/26. During this time, our core DNS platform remained online and fully operational. We observed a routine infrastructure event in our cloud environment. While this activity is normally transparent, a small number of desktop clients did not immediately reconnect as expected. As a result, a limited subset of users experienced temporary DNS resolution issues. This was not a system‑wide outage, and the impact was isolated. The issue was resolved as affected clients re‑established connectivity, and no backend services required intervention. To further reduce the likelihood of this scenario in the future: * We have client‑side improvements coming in an upcoming desktop client release to enhance automatic recovery. * We are continuing to strengthen backend failover and routing behavior during brief infrastructure transitions. We understand how critical DNS reliability is and appreciate your patience. Please don’t hesitate to reach out if you have questions or would like to discuss this further with your customers.

  2. postmortem Mar 24, 2026, 06:00 PM UTC

    ## **Clarified Incident Summary \(Refined Draft\)** We’ve completed an initial review of the recent DNS disruption and wanted to share a brief update. During the event, **core backend DNS services** — including client assignment, policy calculation, cache, and internal resolution — **remained healthy and within normal operating thresholds**. There was no indication of a backend-wide outage or systemic DNS resolver failure. We did observe a **short-lived infrastructure event** in which compute instances were cycled as part of standard cloud lifecycle behavior. While this activity is expected and normally transparent, it appears to have intersected with **client-side behavior** in a limited set of scenarios. Based on current analysis, **impact was limited to a small subset of users**, primarily those running the **desktop DNS client**. In these cases, some clients may not have fully re-established state following upstream infrastructure changes, resulting in **intermittent DNS resolution failures despite backend availability**. To address this class of issue, an **upcoming desktop client release** includes improvements to client-side recovery logic — specifically around **session rehydration and resolver failover handling** — to ensure more reliable recovery during transient infrastructure events. In parallel, we are continuing work to **optimize backend failover behavior**, including reducing switching time and improving cross‑datacenter traffic re‑routing to further harden the platform during short-lived infrastructure transitions. A deeper review is ongoing to fully correlate **client behavior, infrastructure state, and network conditions** during the incident window. We will share additional findings as they become available. We appreciate your patience and take reliability very seriously. ## **Approximate Timeline \(High Confidence\)** > _Times are approximate and based on internal observations and message timestamps._ * **~12:45–1:00 PM ET** First internal reports of DNS resolution issues begin to surface, primarily affecting desktop clients. * **~1:00–1:20 PM ET** Engineering confirms backend DNS components are operational; infrastructure instance cycling observed during this window. * **~1:20–1:45 PM ET** Additional instances added as a precaution; backend traffic and resolver responses confirmed healthy. Focus shifts toward client-side behavior. * **~2:00 PM ET onward** Impact appears limited to a subset of desktop clients. Clients recover as state is re-established or DNS settings are reset. Deeper investigation initiated.

Read the full incident report →

Notice February 18, 2026

[AutoElevate] High Latency and Failure Rate

Detected by Pingoru
Feb 18, 2026, 12:58 AM UTC
Resolved
Feb 18, 2026, 03:39 AM UTC
Duration
2h 41m
Affected: Agent ServicesAdmin PortalMobile Apps
Timeline · 5 updates
  1. investigating Feb 18, 2026, 12:58 AM UTC

    We are currently investigating the issue that seems to be caused by our upstream provider.

  2. identified Feb 18, 2026, 01:14 AM UTC

    The issue has been identified within the Heroku platform and they are actively working to resolve it. We will provide updates as soon we receive them.

  3. identified Feb 18, 2026, 01:28 AM UTC

    We are continuing to look to our upstream provider on a fix for this issue.

  4. monitoring Feb 18, 2026, 02:47 AM UTC

    Services are recovering and returning to normal. We are continuing to monitor and will post additional updates here if the issue persists.

  5. resolved Feb 18, 2026, 03:39 AM UTC

    All AutoElevate services are back up and running as normal. Heroku (upstream provider) updates their status page with the following: "We’ve confirmed that the solution implemented to mitigate the issue causing the service disruption was successful. Engineers have observed that the service is stable and have resolved the incident. Customers should no longer see any impact. We will fully investigate the incident, confirming the technical trigger, the underlying cause, and preventive action to avoid a repeat in the future. We apologize for how you and your business may have been affected by this incident." https://status.heroku.com/incidents/2915

Read the full incident report →

Looking to track CyberFOX downtime and outages?

Pingoru polls CyberFOX's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when CyberFOX reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track CyberFOX alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring CyberFOX for free

5 free monitors · No credit card required