Thanks, Susan. That link has been very unresponsive today; likely given the events. Here is a text grab of No-IP's response for anyone that is having issues retrieving the link:
*******UPDATE******* > > Is your service down because of this outage? The solution we have > available at the moment is for you to create a new hostname on a domain > that has not been seized by Microsoft. The following domains are free and > working > > ddns.net > webhop.me > serveminecraft.net > ddnsking.com > onthewifi.com > > To create a new hostname, login to your No-IP account and click on the > Hosts/Redirects tab. Click a "Add a Host". Type in your hostname and also > choose one of the working domains. > > We apologize for this outage. At this point it is completely out of our > hands, but please understand that we are fighting for you. > > Thank you > > ******* > > We want to update all our loyal customers about the service outages that > many of you are experiencing today. It is not a technical issue. This > morning, Microsoft served a federal court order and seized 22 of our most > commonly used domains because they claimed that some of the subdomains have > been abused by creators of malware. We were very surprised by this. We have > a long history of proactively working with other companies when cases of > alleged malicious activity have been reported to us. Unfortunately, > Microsoft never contacted us or asked us to block any subdomains, even > though we have an open line of communication with Microsoft corporate > executives. > > We have been in contact with Microsoft today. They claim that their intent > is to only filter out the known bad hostnames in each seized domain, while > continuing to allow the good hostnames to resolve. However, this is not > happening. Apparently, the Microsoft infrastructure is not able to handle > the billions of queries from our customers. Millions of innocent users are > experiencing outages to their services because of Microsoft's attempt to > remediate hostnames associated with a few bad actors. > > Had Microsoft contacted us, we could and would have taken immediate > action. Microsoft now claims that it just wants to get us to clean up our > act, but its draconian actions have affected millions of innocent Internet > users. > > Vitalwerks and No--IP have a very strict abuse policy. Our abuse team is > constantly working to keep the No--IP system domains free of spam and > malicious activity. We use sophisticated filters and we scan our network > daily for signs of malicious activity. Even with such precautions, our free > dynamic DNS service does occasionally fall prey to cyber scammers, > spammers, and malware distributors. But this heavy-handed action by > Microsoft benefits no one. We will do our best to resolve this problem > quickly. > > About No--IP > For over 14 years, No--IP has been offering the best and most affordable > Dynamic and Managed DNS solutions. Our robust Anycast Network with points > of presence in 18 different world-class facilities across the globe > guarantees our 100% Uptime, because let's face it, there are no upsides to > downtime. No-IP is the preferred choice for users on the Internet for > dynamic DNS compared to smaller, less reliable alternatives. Our DNS > Experts will ensure that your website is fast, reliable and always > available. > > Contact > Natalie Goguen > Marketing Manager > 5905 South Virginia Street, Suite 200 > Reno, NV 89502 > [email protected] > > Support requests will not be answered via email. Please open a support > ticket <http://www.noip.com/ticket> if you need assistance. > > ### > -- Espi On Tue, Jul 1, 2014 at 11:59 AM, Susan Bradley <[email protected]> wrote: > No-IP's Formal Statement on Microsoft Takedown | No-IP Blog - Managed DNS > Services: > https://www.noip.com/blog/2014/06/30/ips-formal- > statement-microsoft-takedown/ > > Susan Bradley > Hey @msftsecresponse #thanksforputtingthealertsback > > On 7/1/2014 11:35 AM, Micheal Espinola Jr wrote: > >> http://blogs.technet.com/b/microsoft_blog/archive/2014/ >> 06/30/microsoft-takes-on-global-cybercrime-epidemic-in- >> tenth-malware-disruption.aspx >> -- >> Espi >> > > > >

