We are aware that many of our services are showing as down or offline, including web servers, emails, DNS engine and our main website
This was identified this as a DDoS Attack on the DNS services of one of our providers.
Their server engineers are currently working on redirecting this attacks and reviewing options to prevent this happening again in the future.
Update: Our provider is still working to mitigate this issue and roll out robust preventative measures, normal service will resume as soon as possible and we thank you for your patience.
Update @ 01:00: The attack has ceased and our provider has taken some steps to better protect some infrastructure. They will review the situation over the coming hours and make a report in due course. Please accept our apologies for any inconvenience.
Update @ 12:35 23/09/20: The attack has recommenced. Our provider has deployed a secondary NS server as of yesterday evening in a different IP location, however it appears the glue records are taking some time to propagate around the Internet. They are continuing to review and look at options.
Update @ 14:38 23/09/20: Our provider came to the conclusion that the new DNS server built off-network wasn't serving requests fast enough and this was leading to fatal timeouts, despite the hardware being over-specified (on paper). They have abandoned this server and built another server in a different location over the last two hours, and changed the DNS glue records to this new server and are waiting propagation to the wider Internet. They are continuing to monitor the situation.
Update @ 15:27 23/09/20: The attack is ongoing, but DNS lookup services are restoring to availability as the new DNS glue records propagates around the Internet. Traffic levels appear nominal for the time of day (excluding attack bandwidth).