Server Restart 9:00am 02 May 2018 - 10mins (Resolved)
  • Priority - Low
  • Affecting Server - Shared-Server
  • Server Restart
    Server restart required on the 02/05/2018 at 9:00am Down Time 10 min

  • Date - 02/05/2018 09:00 - 02/05/2018 09:10
  • Last Updated - 12/05/2018 08:42
Scheduled Server Maintenance (Resolved)
  • Priority - High
  • Affecting Server - Shared-Server
  • Update: 12/01/2018 09:00


    Maintenance Notice: Please be advised that the following Linux hosting server will be undergoing a maintenance for the reason mentioned below.

    Reason: Cloud Linux Kernal Investigating

    Affected Servers:

    Maintenance Window:

    Date & Time: 13th to the 14th Jan 2018

    Duration: There will be intermittent outages through out the investigation

    Affected Services: Website - Mail - FTP - SSH - Billling Acounts, Cpanel Ireland Website

    Update: 14/01/2018 22:39

    We have found a problem with the Cloud linux server's Kernel which prevents the server to boot up. We have contact Cloud Linux and they will be providing a fix for us tomorrow.
    Once this fix has been applied. we will be rebooting the server for the changes to take effect, the down time will be 5 - 10 Minutes.

    Please Check back here again to find out the time of the reboot.

    Update: 15/01/2018 21:00

    The Investigation is still continuing, the server did not need a restart today, The procedure will continue tomorrow.
    Please check back here for updates.

    Update: 28/01/2018 24:00

    for updates on the RHEL/CentOS 6 kernel breaking XenServer issue.

    RHEL 6 XEN guest with kernel-2.6.32-696.18.7.el6.x86_64 hangs on boot

    Solution In Progress - UpdatedFriday at 1:55 AM-


    • RHEL 6 guest doesn't boot with kernel-2.6.32-696.18.7.el6.x86_64 after patching.
    • System boots up with previous kernels successfully.
    • The guest hangs on the following messages at boot:

      (XEN) mm.c:2560:d27 Bad type (saw 7400000000000001 != exp 1000000000000000) for mfn 21ed59b (pfn 1e05)
      (XEN) d27:v0: unhandled page fault (ec=0000)
      (XEN) Pagetable walk from ffffffffff400000:
      (XEN)  L4[0x1ff] = 000000214d50f067 0000000000001a91
      (XEN)  L3[0x1ff] = 000000214d50e067 0000000000001a92
      (XEN)  L2[0x1fa] = 0000000000000000 ffffffffffffffff
      (XEN) domain_crash_sync called from entry.S: fault at ffff82d080203a7a entry.o#create_bounce_frame+0x125/0x13b
      (XEN) Domain 27 (vcpu#0) crashed on cpu#0:
      (XEN) ----[ Xen-4.4.4OVM  x86_64  debug=n  Not tainted ]----
      (XEN) CPU:    0
      (XEN) RIP:    e033:[]
      (XEN) RFLAGS: 0000000000000202   EM: 1   CONTEXT: pv guest (d27v0)
      (XEN) rax: 0000000000000000   rbx: ffffffffff400000   rcx: 0000000000000004
      (XEN) rdx: 0000000000000010   rsi: ffffffffff400000   rdi: ffffffff81a03e68
      (XEN) rbp: ffffffff81a03e48   rsp: ffffffff81a03e00   r8:  0000000000000000
      (XEN) r9:  0000000000007ff0   r10: 0000000000000000   r11: 0000000000000000
      (XEN) r12: ffffffff81a03e58   r13: ffffffffff400000   r14: ffffffffff410000
      (XEN) r15: ffffffff81a03e68   cr0: 000000008005003b   cr4: 00000000001526f0
      (XEN) cr3: 000000214d512000   cr2: ffffffffff400000
      (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033

    Update: 14/02/2018 18:48

    New Kernel Released, A compatible version of this kernel for Xen-PV will go to beta release at the end of the week.

    Changelog since kernel-3.10.0-714.10.2.lve1.5.9:

    • AL-2579: fixed GRUB checks when system uses UEFI;
    • CLKRN-153: fixed possible race between dentry_kill and RCU-walk;
    • CLKRN-203: fixed kernel panic;
    • CLKRN-210: fixed CVE-2017-5715 [branch target injection] also known as 'Spectre Variant 2';
    • fixed SPEC_CTRL and IBPB_SUPPORT features setting after microcode update;
    • KMODLVE-123: postpone lvp pmem limit enforcement if first attempt failed;
    • KMODLVE-149: check a notifier pointer while unregistering notifiers;
    • CLEN-61: restored serialized access to TSC through mfence;
    • restored patch to fix regression and cover CLKRN-172.

    Update: 21/02/2018 15:11

    Finally An updated Kernel has been released to address the problem with the server rebooting.
    The below Kernel Has been installed and the server has rebooted Successfully.

    CloudLinux 6 kernel version 
    2.6.32-896.16.1.lve1.4.53 is available for download from our updates-testing repository.


    Changelog since kernel-2.6.32-896.16.1.lve1.4.52:


    • CLKRN-219: fixed boot on Xen PV instances;
    • CKSIX-148: disabled certain printk's for UBC OOM path to not spam into dmesg log.


  • Date - 13/01/2018 09:00 - 21/02/2018 15:00
  • Last Updated - 21/02/2018 15:12
Server 63 Down - Critical (Resolved)
  • Priority - Critical
  • Affecting Server - Shared-Server
  • Hello,

    We found a network issue in shared server server63 and we are working at the moment to fix it. We will provide more information regarding the situation soon.

    Update Oct 1st 21:02

    Our admins are still working on this situation. Server is up but not accessible via public network. We will keep you posted about the situation.

    Update Oct 1st 23:47

    Engineers are still working on resolving access to server63. We are currently working as fast as possible to bring the server back on-line.

    Update Oct 2nd 00:12

    We have been unable to recover the server as the file system has been corrupted. We have started a restore of the server and this will take approx 7 hours to complete. We apologise for any inconvenience caused

  • Date - 01/10/2017 00:21 - 02/10/2017 00:50
  • Last Updated - 02/10/2017 09:28
Dos & Ransomware Attack On the Cpanel Ir (Resolved)
  • Priority - Critical
  • Affecting System - Cpanel Ireland Network
  • Ransomware 

    At 5:30am this morning we were notified by our data centre that Ransomware had been injected and replicating through our network.
    All our servers run on Linux Operating systems so the Ransomeware did not affect any of the files or user data stored on the servers but could have infected any website users using windows operating systems.
    With this information a decision was made to take all servers offline until a security audit was completed and all disks where scanned and all threats were removed.

    Several Patches have been installed on our network to minimise the risk of this attack again, but the truth of it is that these attackers can and will alter their code to try these attacks again.
    The attack was not targeted at Cpanel Ireland directly but was spread through other networks across the country.

    All Servers are now back on-line and rest assured that no information held on the Cpanel Ireland Network was retrieved or compromised.

  • Date - 14/05/2017 05:30 - 14/05/2017 13:00
  • Last Updated - 15/05/2017 10:16
DOS Attack (Resolved)
  • Priority - Critical
  • Affecting Server - Shared-Server
  • A Denial Of Service Attack was detected today on our network at 14:00pm Today 06/02/2017.
    The attack was migrated and and service was restored at 14:15 Today 06/02/2017.

    The attack originated from Argentina and the netherlands from the following ip address, - -

  • Date - 06/02/2017 14:00 - 06/02/2017 14:15
  • Last Updated - 06/02/2017 14:23
Scheduled Server Maintenance (Resolved)
  • Priority - Critical
  • Affecting Server - Shared-Server
  • Scheduled Server Maintenance - 15th April
    As part of our regular network and systems upgrades, we will be Test server systems this Friday 15th of April.
    No down time is expected during this process but it may low things down a bit from time to time untill complete.

  • Date - 15/04/2016 08:00 - 15/04/2016 18:00
  • Last Updated - 17/05/2016 09:57
Root Kit Attack - Centos 5.x (Resolved)
  • Priority - Critical
  • Affecting Server - Shared-Server
  • Root Kit Attack 

    Tough Medicine For Windigo Victims

    “The Ebury backdoor deployed by the Windigo cybercrime operation does not exploit a vulnerability in Linux or OpenSSH,” continued Léveillé. “Instead it is manually installed by a malicious attacker. The fact that they have managed to do this on tens of thousands of different servers is chilling. While anti-virus and two factor authentication is common on the desktop, it is rarely used to protect servers, making them vulnerable to credential stealing and easy malware deployment.”

    The Advice given was - If sysadmins discover their systems are infected, they are advised to wipe affected computers and reinstall the operating system and software.  It is essential that fresh passwords and private keys are used, as the existing credentials must be considered compromised.

    For a higher level of protection in future, technology such as two-factor authentication should be considered.

    “We realise that wiping your server and starting again from scratch is tough medicine, but if hackers have stolen or cracked your administrator credentials and had remote access to your servers, you cannot take any risks,” explains Léveillé.  “Sadly, some of the victims we have been in touch with know that they are infected, but have done nothing to clean up their systems – potentially putting more internet users in the firing line.”

    All computer users are reminded that they should never reuse or choose easy-to-crack passwords.

    No Hosting accounts were breached in this attack ONLY the OS was effected.

    Steps taken to clean server.

    1. Format all Drive's
    2. Install OS
    3. update OS
    4. Install Cpanel
    5. Update Cpanel
    6. Configure OS & Cpanel
    7. Install Firwall / Update & Configure
    8. Upload Hosting Account backups from 31/12/2014
    9. Restore Backups
    10. Check account Restoration for errors

    Currently running Centos 6.6 x86_64 xenpv Server

  • Date - 02/01/2015 17:00 - 03/01/2015 20:00
  • Last Updated - 03/01/2015 03:24
Network Upgrade (Resolved)
  • Priority - Critical
  • Affecting System - Network Upgrade
  • The Network infrastructure will be upgraded over the weekend This is a necessary upgrade to the data center to facilitate growing demands on the system.

    The Server: will be down until Monday while the upgrade is taking place.

    Please check back here for updates.

  • Date - 14/09/2013 00:30 - 01/11/2014 22:41
  • Last Updated - 13/09/2013 11:47
24/11/2011 (Resolved)
  • Priority - Low
  • Nothing to report

  • Date - 24/11/2011 22:21 - 26/11/2011 00:00
  • Last Updated - 24/11/2011 22:22

Server Status

Below is a real-time overview of our servers where you can check if there's any known issues.

Server Name HTTP FTP POP3 PHP Info Server Load Uptime
Shared-Server PHP Info