Dropbox Outage Map
The map below depicts the most recent cities worldwide where Dropbox users have reported problems and outages. If you are having an issue with Dropbox, make sure to submit a report below
The heatmap above shows where the most recent user-submitted and social media reports are geographically clustered. The density of these reports is depicted by the color scale as shown below.
Dropbox users affected:
Dropbox is a file hosting service operated by American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software.
Most Affected Locations
Outage reports and issues in the past 15 days originated from:
| Location | Reports |
|---|---|
| Madrid, Madrid | 1 |
| Conneaut, OH | 1 |
| City of London, England | 1 |
Community Discussion
Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.
Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.
Dropbox Issues Reports
Latest outage, problems and issue reports in social media:
-
Red (@rubelr44) reportedyou're paying google $10/month to sit in their server room. dropbox gets $12/month. apple gets $10. the kicker? they can all see your stuff. and when dropbox got breached in 2024? emails, passwords, and tokens were just... out there. there’s this tool called syncthing and it’s honestly kind of a cheat code. no cloud. no company servers. no middleman watching you. it just syncs your files directly between your own devices. peer-to-peer. it's got like 81k stars on github so it’s legit. here is why it wins: direct sync: files go from your phone to your pc. they never touch a 3rd party. privacy: encrypted with tls and crypto certificates. zero friction: no accounts. no sign-ups. just install it and share a device id. everywhere: works on windows, mac, linux, android... even solaris if you're into that. safety net: it has file versioning. if you accidentally delete something, you can just roll it back. the wildest part is that syncthing isn't even a company. it's a swedish non-profit. there is no "cloud" to shut down. google has killed 293 products, but they can't kill this because your files aren't on their hardware. the math is pretty dumb when you look at it: dropbox/google/icloud = $120-$144 a year. syncthing = $0. unlimited storage. unlimited devices. it's been around since 2013 and it's 100% open source. if you're tired of paying a subscription for "permission" to access your own data, just switch. your hardware. your files. forever.
-
gmhacker (@realgmhacker) reported37% of employees knowingly break their company's AI policy. Not accidentally. Knowingly. Shadow IT was USB drives and unapproved Dropbox accounts. Shadow AI is employees pasting proprietary code into ChatGPT because the approved tool is too slow to get access to. 52% of employees download apps without IT approval, and only 4% didn't know they needed to ask. They know the rules. They just decided the rules aren't worth following. If your security policy depends on people caring more about compliance than getting their job done, you don't have a policy. You have a suggestion.
-
John Cartwright°͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌͌ 🐈 🐈 🐈 (@bejiitas_wrath) reportedWindows Defender, the built-in antivirus running on every Windows machine, has a working zero-day exploit with full source code sitting on GitHub. No patch, no CVE, and confirmed working on fully updated Windows 10 and 11. A researcher who says Microsoft went back on their word just handed every attacker paying attention a privilege escalation that takes any low-privileged account straight to NT AUTHORITY\SYSTEM. On Windows Server, the result is different but still serious: a standard user ends up with elevated administrator access. The vulnerability is called BlueHammer. On April 2nd, the researcher posted the public disclosure on a personal blog, and on April 3rd, the full exploit source code went live on GitHub. Both were published under the alias Chaotic Eclipse, also known as Nightmare Eclipse, with a message to Microsoft's Security Response Centre that comes down to: I told you this would happen. In late March, the same researcher opened a blog with a single post explaining that they never wanted to come back to public research. Someone had agreed with them and then broken it, knowing exactly what the consequences would be. The post says it left the researcher without a home or anything. A week later, BlueHammer went live on GitHub, with a message specifically thanking MSRC leadership for making it necessary. That is not someone annoyed with a slow review process. That is someone with nothing left to lose. BlueHammer is not a traditional bug, and it does not need shellcode, memory corruption, or a kernel exploit to work. What it does is chain five completely legitimate Windows components together in a sequence that produces something their designers never intended. Those five components are Windows Defender, Volume Shadow Copy Service, the Cloud Files API, opportunistic locks, and Defender's internal RPC interface. One practical limitation worth knowing: the exploit needs a pending Defender signature update to be available at the time of the attack. Without one in the queue, the chain does not trigger. That makes it less reliable than a push-button exploit, but it does not make it safe to ignore. When Defender runs an antivirus definition update, part of that process involves creating a temporary Volume Shadow Copy, which is the same snapshot mechanism Windows uses for backup and restore. That shadow copy contains files that are normally completely locked during regular operation, including the SAM database, which stores the password hashes for every local account on the machine. BlueHammer registers itself as a Cloud Files sync provider, the same kind of thing that OneDrive or Dropbox uses to sync files. When Defender touches a specific file inside that folder, the exploit gets a callback and immediately places an opportunistic lock on that file. Defender stalls, blocked, waiting for a response that is never coming. The shadow copy it just created is still mounted. The window is open. With Defender frozen in place, the exploit reads the SAM, SYSTEM, and SECURITY registry hives directly from the snapshot. It decrypts the stored NTLM password hashes using the boot key pulled from the SYSTEM hive, changes a local administrator account's password, logs in with that account, copies the administrator security token, pushes it to the SYSTEM level, creates a temporary Windows service, and spawns a command prompt running as NT AUTHORITY\SYSTEM. Then, to cover its tracks, it puts the original password hash back. The local account password looks completely unchanged. No crash, no alert, nothing. The Cloud Files provider name hardcoded in the exploit source code reads IHATEMICROSOFT. The administrator password used during the escalation is hardcoded as $PWNed666!!!WDFAIL. These are not bugs left by accident. They are messages, written directly into the code, and there is only one intended reader.
-
Hany (@kmhaneem) reportedDropbox launched in 2008 with a simple promise. Put your files in this folder and we will sync them everywhere. Every sync goes through their servers first. Their infrastructure. Their terms. Your files sit on their machines until you need them back. A developer named Jakob Borg decided that was the wrong architecture. Not inconvenient. Wrong, at the level of who owns what. In December 2013 he shipped the first public release of Syncthing. Peer-to-peer file sync. Your devices talk directly to each other. No company in the middle. No server reading the transfer. Syncthing is free, open-source, and has 67,000+ GitHub stars. The project's own stated mission: your data is your data alone, and you deserve to choose where it is stored. Most sync tools list speed and storage first. Syncthing's README lists data protection as priority 1 and priority 2. Speed does not even make the list. That tells you exactly what this project is. -> Your files go from your laptop to your phone. Nowhere else. -> Works on Windows, Mac, Linux, Android, and more. -> No storage cap. Your limit is your own hardware. -> Peer-to-peer sync. Direct device to device, encrypted in transit. -> Runs silently in the background. Zero clicks after setup. -> Web UI included. No command line required to use it daily. -> Open protocol means no vendor can quietly change the rules on you. -> GPG-signed releases. You can verify every binary before running it. -> Versioning built in. Deleted something? You can get it back. -> Self-hostable discovery servers if you want to go fully off-grid. By 2019, Syncthing was getting roughly a million downloads per stable release and syncing hundreds of terabytes of data every day. It is now backed by the Syncthing Foundation, a Swedish non-profit, so no company can buy it, pivot it, or shut it down. Last commit: this week. Shipping continuously since 2013. 300+ contributors. Still pushing updates in 2026. Dropbox: $9.99/month. Google Drive: $9.99/month. Syncthing: $0. Forever. No account to create. No server holding your files hostage. No price hike email arriving on a Tuesday morning. No terms-of-service update quietly granting them new rights to your content. Cancel Dropbox and your access dies with it. Run Syncthing and nothing changes. Your files are on your machines. They stay there whether you open GitHub tomorrow or never again. That is not a feature. That is a different relationship with your own data. 67,000+ stars. MPLv2 license, which means no corporation can quietly close it down. 300+ contributors across a decade. Updated this week. The people who switch to Syncthing are not always the most technical. They are the ones who read the terms of service once and could not unsee them. If that sounds like you, the link is worth a look. (Link in the comments)
-
Anna Longthorp (@AnnaLongthorp) reportedRecently got my X account back after being hacked. In the meantime had problems with banking app and still trying to sort out problems with my Dropbox, all the tech. We can’t turn old things off until the new things are properly working, INCLUDING ENERGY @Ed_Miliband 1/3
-
daniela molloy (@diandrasdiandra) reportedcoachella taking down the stream right when i'm at the start of it... okay *******. can someone send me like a link? a dropbox, a mega file, a drive, something?
-
The Wisemen Alpha (@Wisemenmentors) reportedTold properly for the first time @toly. Soviet Ukraine. 13 years at Qualcomm. Dropbox. 4 AM at Cafe Sole with two coffees and a beer. The moment you realized the problem wasn't consensus, it was time itself.
-
Invest Lens (@AIadventure3) reported@gabrielchua On the outlook email plugin, when you draft replies the formatting is very bad. Is there a fix coming for this? Also, please add Dropbox and Asana plugins.
-
The New Release Guy (@moviesplusgames) reported@Dropbox Maybe it is a skill issue, like ppl keep saying....bc they're WAY behind a company like X.
-
Cryptosailor (@robertdavid010) reported@zmanian The issue was not focusing on the actual innovation being done in the Cosmos eco, & instead getting wrapped up in crypto casino degen hype. Eg. @Jackal_Protocol delivers on a decentralized 'Dropbox' @gitopiaDAO delivers on decentralized 'GitHub' (all Cosmos project should use)
-
“Ijebu Tax” (@OlalekanOR) reported@TaoFeek182 Tbh, I could not download it, the Dropbox was not working. I'd share with you once I get hold of it.
-
The Bingus Man (@NotNordgaren) reported@Dropbox you guys wanna shut down the links I sent you that are hosting malware or are you gonna sit on it another week?
-
Seph🌟 (@_Necr0sis_) reported@SClassYvan @ibejiggly Tbf they also use dropbox, Telegram, and MediaFire. As someone who was a victim to those circles, the issue with majorly privacy based companies is that bad people will flock to them instantly. There are completely normal people who use MEGA, BUT (1/2)
-
Adel Bucetta (@adelbucetta) reported@heynavtoor most people just upload to google drive or dropbox, but nobody's talking about how terrible their video quality is afterwards
-
Joseph Fritzl (@uf__001) reported@TheTigersBurner @fredsoda That’s not a Pton problem imo, that’s just entry level jobs drying up everywhere And 10 years ago it was also the case that 90% of on campus recruiting was finance or consulting. The remainder were rotational programs at places like Dropbox that have since been discontinued