Cloudflare

Cloudflare Outage Map

The map below depicts the most recent cities worldwide where Cloudflare users have reported problems and outages. If you are having an issue with Cloudflare, make sure to submit a report below

Loading map, please wait...

The heatmap above shows where the most recent user-submitted and social media reports are geographically clustered. The density of these reports is depicted by the color scale as shown below.

Cloudflare users affected:

Less
More

cloudflare Hero Image

Cloudflare is a company that provides DDoS mitigation, content delivery network (CDN) services, security and distributed DNS services. Cloudflare's services sit between the visitor and the Cloudflare user's hosting provider, acting as a reverse proxy for websites.

Map Check Current Status

Most Affected Locations

Outage reports and issues in the past 15 days originated from:

Location Reports
London, England 15
Melbourne, VIC 12
Madrid, Comunidad de Madrid 11
Berlin, Land Berlin 10
Sydney, NSW 10
Frankfurt am Main, Hessen 8
Vienna, Wien 7
Zürich, ZH 6
Paris, Île-de-France 5
Lyon, Auvergne-Rhône-Alpes 5
Dresden, Saxony 5
Hamburg, HH 5
Warsaw, Województwo Mazowieckie 4
Manchester, England 4
Seattle, WA 4
Marseille, Provence-Alpes-Côte d'Azur 3
Hyderabad, TG 3
Adelaide, SA 3
Bristol, England 3
Munich, Bavaria 3
Cardiff, Wales 3
Newham, England 3
City of London, England 3
Jewar, UP 2
Magdeburg, Saxony-Anhalt 2
Hannover, Lower Saxony 2
Toronto, ON 2
Oostvaardersdiep, fl 2
Los Angeles, CA 2
Bremen, Bremen 2

Community Discussion

Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.

Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.

Cloudflare Issues Reports

Latest outage, problems and issue reports in social media:

  • AllTheInternets Zeb Anderson (@AllTheInternets) reported

    @dok2001 @Cloudflare A non-serverless hosting package so we don't have to cry when **** only runs for a minute and then dies on vercel

  • GauravBhogale Gaurav (@GauravBhogale) reported

    @dok2001 @Cloudflare An 'Agent Passport', we need a standardized way to authenticate helpful agents vs. scrapers/spam at the network layer. Maybe this looks like a cryptographic, dynamic robots.txt

  • ntakashics Nicolas Takashi (@ntakashics) reported

    @dok2001 @Cloudflare workers with grpc support, be able to consume kafka messages from workers.

  • johnturner John Turner (@johnturner) reported

    @elijahbowie @adocomplete @trq212 Yep would love to see an official solution. I have the claude agent sdk working on the cloudflare sandbox but very slow.

  • mustang_akin Mustang (@mustang_akin) reported

    @Shinar_29 No bypass. I’m using official Telegram APIs / bot flows(you can get your telegram api key from bot father) . Cloudflare only becomes an issue with scraping or unofficial web automation.

  • grok Grok (@grok) reported

    @vybhav1428 Sure! Here's a simple summary of the article: Unkey, an API platform, switched from serverless tech (like Cloudflare Workers) to traditional servers because serverless caused slow performance. Main issues: data caching took too long (over 30ms instead of under 10ms), and the "stateless" setup meant extra network calls for everything, making logging and analytics tricky and complex. They moved to Go servers on AWS, boosting speed 6x, simplifying code, cutting costs, and adding features like easier self-hosting. Serverless is great for sporadic tasks but not for high-speed, constant workloads.

  • thehungrybird_ aryan (@thehungrybird_) reported

    @rajawdotxyz @MattieTK @Cloudflare I tried earlier multiple times but never worked for me.

  • NickSRandall Nick Randall (@NickSRandall) reported

    @dok2001 @chatsidhartha @Cloudflare Resurrect MQTT pub/sub service 🙏

  • SocialSight SocialSight (@SocialSight) reported

    @eastdakota cloudflare down bad today

  • rajawdotxyz Raja (@rajawdotxyz) reported

    @thehungrybird_ @MattieTK @Cloudflare If you can report issues in GitHub(preferably) or here, then it would be really helpful for people working on these.

  • masylum Pao Ramen (@masylum) reported

    @dok2001 @Cloudflare My wishlist: - Full observability (APM, alerting, error tracking..) - Hosted Postgres/MySQL - Encrypted secrets at wrangler.conf (we are using dotenvx locally now, but then we have to provision secrets manually, it sucks) - Uniqueness, debounce/throttle for queues.

  • maescool Pieter Maes (@maescool) reported

    @dok2001 @Cloudflare I wonder if they have UDP support yet

  • grok Grok (@grok) reported

    @vybhav1428 Yes, in serverless setups like Cloudflare Workers, data caching often requires network calls to external storage, which took over 30ms at high percentiles—far slower than the sub-10ms goal. Serverless is stateless, meaning no persistent local data; every request must fetch info over the network (e.g., from databases or caches), adding latency. Traditional servers keep data in-memory locally, avoiding those extra calls.

  • IGoodnessIyamah IG (@IGoodnessIyamah) reported

    human accounts or manual billing. It uses the old HTTP “402 Payment Required” code embedded in web requests. Coinbase and Cloudflare built and support the standard, now governed through the x402 Foundation to encourage broad adoption. The Cloudflare Blog Facilitators

  • kadarsh115 Archon (@kadarsh115) reported

    Why Cloudflare treats cache invalidation as a system design problem, not an ops task Core idea first: Caching is easy. Cache invalidation is where systems break. Early on, teams cached aggressively. Pages loaded faster. Costs dropped. Everyone was happy. Until users started seeing: — stale content — broken sessions — inconsistent behavior across regions At Cloudflare scale, this wasn’t a bug. It was a design flaw. Caches sit everywhere: — edge locations — regional POPs — browser caches — upstream proxies When data changes, who updates which cache , and when, matters. Invalidating everything is slow and expensive. Invalidating nothing is incorrect. Cloudflare learned the hard way that cache strategy isn’t about speed. It’s about control. So they design caching with: — clear TTL ownership — selective invalidation — versioned assets — safe defaults when invalidation fails Not to be perfect. But to be predictable. The lesson: Caching doesn’t make systems fast. Well-designed invalidation makes them correct. At scale, stale data is just another form of outage.

Map Check Current Status