All Systems Operational

About This Site

To subscribe to updates please contact support@upguard.com.

UpGuard CyberRisk Operational
90 days ago
100.0 % uptime
Today
Web App Operational
90 days ago
100.0 % uptime
Today
External API Operational
90 days ago
100.0 % uptime
Today
Authentication Operational
90 days ago
100.0 % uptime
Today
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Response Time
Fetching
Jul 6, 2025

No incidents reported today.

Jul 5, 2025

No incidents reported.

Jul 4, 2025
Resolved - All additional risks generated have now been removed.

The score history graph may continue to show a dip for a period of a week. If needed, please use this incident as evidence of why the score dropped temporarily.

Jul 4, 08:13 UTC
Monitoring - A change to UpGuard's scanning engine has been deployed. The additional 'SSL not found' risk detected on domains using Cloudflare proxy services, will be removed upon the next scan. All domains will be rescanned within 24 hours, and this issue will be resolved.
Jul 3, 05:56 UTC
Identified - We are currently developing and testing a change to UpGuard's scanning engine to ignore unused Cloudflare HTTP ports. This will cause the 'SSL Not Available' risks to be removed when the domains are rescanned next.
The next update will be after this change has been implemented.

Jul 3, 01:18 UTC
Investigating - In Cloudflare, there is a setting in SSL->'Edge Certificates'->'Always use HTTPS' that is used to redirect from http to https for Cloudflare proxied domains.

The behavior of this setting changed last week (approx June 26) for non-standard ports. This change causes a failure when browsing to the port, instead of a successful redirect and response. This has caused UpGuard's scanning engine to detect these as not using HTTPS, and therefore raises a risk 'SSL Not Available'.

The non-standard ports HTTP ports used by Cloudflare are: 8080, 8880, 2052, 2082, 2086, 2095. The default http port (80), has not changed behavior.

Using upguard.in as an example, previously this setting would perform like this:
http://upguard.in:8080 → redirect to https://upguard.in
and now it behaves like this:
http://upguard.in:8080 → redirect to https://upguard.in:8080 (and https fails on this http only port).

Cloudflare support have not responded at this time, and we have found no documentation to support a change in behavior.

Public risk waivers with an short expiry have been put in place against UpGuards domains, while we investigate.

Jul 3, 01:15 UTC
Jul 3, 2025
Jul 2, 2025

No incidents reported.

Jul 1, 2025

No incidents reported.

Jun 30, 2025

No incidents reported.

Jun 29, 2025

No incidents reported.

Jun 28, 2025

No incidents reported.

Jun 27, 2025

No incidents reported.

Jun 26, 2025

No incidents reported.

Jun 25, 2025

No incidents reported.

Jun 24, 2025

No incidents reported.

Jun 23, 2025

No incidents reported.

Jun 22, 2025

No incidents reported.