Cloudflare Outage Map
The map below depicts the most recent cities worldwide where Cloudflare users have reported problems and outages. If you are having an issue with Cloudflare, make sure to submit a report below
The heatmap above shows where the most recent user-submitted and social media reports are geographically clustered. The density of these reports is depicted by the color scale as shown below.
Cloudflare users affected:
Cloudflare is a company that provides DDoS mitigation, content delivery network (CDN) services, security and distributed DNS services. Cloudflare's services sit between the visitor and the Cloudflare user's hosting provider, acting as a reverse proxy for websites.
Most Affected Locations
Outage reports and issues in the past 15 days originated from:
| Location | Reports |
|---|---|
| Farmers Branch, TX | 1 |
| Helsinki, Uusimaa | 1 |
| Crisfield, MD | 2 |
| Nanaimo, BC | 1 |
| New York City, NY | 1 |
| Istanbul, Istanbul | 1 |
| Greater Noida, UP | 2 |
| Paris, Île-de-France | 1 |
| Noida, UP | 2 |
| Augsburg, Bavaria | 1 |
| Bengaluru, KA | 1 |
| Montataire, Hauts-de-France | 1 |
| London, England | 1 |
| Attleborough, England | 1 |
| Colima, COL | 1 |
| Leuven, Flanders | 1 |
| New Delhi, NCT | 1 |
| Mâcon, Bourgogne-Franche-Comté | 1 |
| Amsterdam, nh | 1 |
| Ashburn, VA | 1 |
| Rosario, SF | 1 |
| Merlo, BA | 1 |
| Frankfurt am Main, Hesse | 1 |
| Birmingham, AL | 1 |
| Dayton, OH | 1 |
| Miami, FL | 1 |
| Osnabrück, Lower Saxony | 1 |
| Bulandshahr, UP | 1 |
Community Discussion
Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.
Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.
Cloudflare Issues Reports
Latest outage, problems and issue reports in social media:
-
CyrilXBT (@cyrilXBT) reportedANTHROPIC JUST DROPPED THE MOST SIGNIFICANT CYBERSECURITY ANNOUNCEMENT OF THE YEAR AND NOBODY IS TALKING ABOUT IT. Claude Mythos. One month. 10,000 plus critical vulnerabilities found across the internet's most critical infrastructure. Let the numbers land. Cloudflare: 2,000 bugs. 400 high and critical severity. Mozilla: 271 vulnerabilities in Firefox 150. Ten times more than were found in Firefox 148. wolfSSL: Found a way to forge certificates on a crypto library used by billions of devices. 1,000 plus open source projects scanned. 90.6% true positive rate after human review. At one partner bank Mythos prevented a fraudulent $1.5 million wire transfer in real time. The UK AI Security Institute: first model to solve BOTH their cyber attack simulations end to end. And here is the part that changes everything. Maintainers are asking Anthropic to slow down. Not because the findings are wrong. Because they cannot patch fast enough to keep up. Microsoft confirmed patch volume will continue trending larger for some time. This one quote from the announcement is the most important sentence in cybersecurity in 2026: "Progress on software security used to be limited by how quickly we could find vulnerabilities. Now it is limited by how quickly we can patch them." The bottleneck just shifted. For decades the problem was that humans could not find bugs fast enough. Claude Mythos just eliminated that constraint entirely. The new problem is that humans cannot fix bugs fast enough. Which means the next frontier is AI that finds the bugs and writes the patches simultaneously. That capability is months away not years. The software security landscape is about to look completely different. Bookmark this. Follow @cyrilXBT for every Anthropic release that changes the security landscape the moment it drops.
-
🕯️schizocat 🕯 alt: @lofischizo (@hifischizo) reportedyo cloudflare needs to **** OFF I JUST WANNA LOOK AT STRATEGYWIKIIII I PRESSED VERIFY RAAAAA I CANT EVEN STUDY CUZ QUIZLET USES CLOUDFLARE
-
henrique cunha (@henrycunh) reportedthe codex mobile app is fantastic holy **** only lacking a tunnel to localhost by default, but cloudflare tunnel quickly fixes it
-
Michael hochstat (@HochstatMichael) reportedCloudflare just made one of the clearest “AI + layoffs” statements we’ve seen from a public company. Despite reporting a strong Q1 2026 (revenue up 34% YoY to $639.8M), Cloudflare cut ~20% of its workforce (~1,100 employees). In a WSJ op-ed, CEO Matthew Prince explained why. His framework (inspired by Peter Drucker) splits roles into: - Builders (engineers, product) - Sellers (sales) - Measurers (ops, HR, finance, compliance, analytics, middle management) The key idea: AI disproportionately replaces “measurers.” Agentic AI can now: - Expand manager span of control - Automate financial close and reporting - Enable continuous risk monitoring - Reduce compliance and audit overhead Most layoffs targeted this category. Prince called out how unusual this is: A company growing 30%+ cutting 20% of its workforce may be a preview of what AI-driven operating models look like. Market reaction was mixed: The stock dropped ~20% initially despite the earnings beat, suggesting investors are still parsing whether this is efficiency-driven upside or a signal of slowing growth. At the same time, Cloudflare is still hiring: - Plans for ~1,111 interns in 2026 - ~1M applications reportedly received - Continued hiring in AI-related roles So this isn’t “shrink the company”—it’s “reshape the workforce.” The open question: If AI meaningfully boosts productivity, do companies reinvest in growth—or lean into margin expansion? Cloudflare is one of the first large-scale test cases. ***
-
Jules Mando (@JulesMandoX) reported@fabienpenso @levelsio @dcbuilder What it means is that he closes ALL ports and only allows access via Tailscale for SSH and Cloudflare tunnel for HTTP. So he doesn’t give a damn that someone finds his server!
-
Jorge (@Jorge__70) reported@Cloudflare @0xhugobatista Dash is broken
-
Moneroon (@moneroon) reported@FemiSuccess7 @UK_Daniel_Card @Cloudflare DNS updates seem to be working - although a bit slow
-
Karthik Reddy (@bykarthikreddy) reported@abhijeet_dipke - The website's domain was put on "clientHold" status by its registrar (Hostinger). - When this happens, the website's address stops working, so Google and Cloudflare can't find it and show NXDOMAIN (website does not exist). - Earlier, the site was still reaching Hostinger's servers but showed 403 Forbidden, meaning the server was active but access was blocked. - This usually happens because of issues like unpaid bills, missing verification, or registrar policy actions. - It does not look like a government internet block. - Since the domain is only a few days old, it's more likely that the website owner or hosting provider caused the shutdown than any government agency.
-
Hacksore (@Hacksore) reportedNo WAF No gRPC/protobufs No Kubernetes No service mesh No 17 layers of observability (Jaeger + Prometheus + Grafana + OpenTelemetry + whatever new **** dropped this week) No "eventually consistent" 8 microservices with Kafka between them No Cloudflare + 3 CDNs + edge functions No "we use hexagonal architecture" No Terraform for 47 resources No "left shift security" bullshit yeah it's not that complicated
-
Soumyadip Nayak (@soumyadip_nayak) reported@abhijeet_dipke Use Cloudflare as nameserver and DNS provider. Also, enable proxy. I can help you in this regards
-
My Info (@MrBison85) reported@dm4uz3 Lol you are brute forcing the auth, and then acting like a psycho when it flags you because you're in Portugal, using a **** VPN, and you act shocked when cloudflare makes you take extra steps to ensure you aren't a bot because youre connected to all sorts of bloatware lol
-
Non-Linear (@nonlinear_james) reported@AniketVarshne @skcd42 Looks like the @Cloudflare captcha is broken?
-
Jonathan (@jonnyMarshal) reported@Cloudflare I can’t login to my dashboard for over 30mins now!
-
Ciprian Popescu (@cipriangb) reported@Cloudflare Email and password still rule the world. Never used a password manager.
-
doom (@mydoom1337) reported6/ COOKIE MISCONFIGURATION & THIRD-PARTY SCRIPT RISK — Medium Risk A Cloudflare bot-management cookie was set with: SameSite=None; Secure While this is a Cloudflare cookie, SameSite=None instructs browsers to send the cookie on cross-site requests. In a crypto-trading context, users are highly targeted by phishing, CSRF-style abuse, session-fixation attempts, fake login pages, and wallet-drainer flows. External scripts were also loaded without Subresource Integrity. The page loaded a Google Tag Manager script without an integrity attribute. Impact: If a tag-manager account, analytics pipeline, or external script source is compromised, malicious JavaScript can execute inside users’ browser sessions. For crypto platforms, third-party JavaScript is part of the security boundary.