Most Reliable Hosting Company Sites in June 2011

Rank Company site OS Outage
DNS Connect First
1 Datapipe FreeBSD 0:00:00 0.004 0.107 0.007 0.015 0.021
2 INetU FreeBSD 0:00:00 0.004 0.169 0.039 0.103 0.248
3 New York Internet FreeBSD 0:00:00 0.004 0.198 0.062 0.124 0.374
4 Hosting 4 Less Linux 0:00:00 0.008 0.136 0.075 0.153 0.337
5 Linux 0:00:00 0.012 0.128 0.068 0.152 0.366
6 Linux 0:00:00 0.019 0.130 0.052 0.291 0.410
7 FreeBSD 0:00:00 0.023 0.232 0.069 0.144 0.352
8 Windows Server 2003 0:00:00 0.023 0.119 0.095 0.191 0.191
9 Kattare Internet Services Linux 0:00:00 0.023 0.132 0.097 0.194 0.348
10 Linux 0:00:00 0.031 0.102 0.046 0.094 0.094

See full table

Each of the top three hosting companies had only one failed request this month and they are therefore ranked by average connection time.

Top of the table this month is Datapipe, which offers a range of services including managed hosting, compliance, security and cloud computing. Datapipe is committed to customer service and offers a 100% network uptime guarantee.

The second most reliable hosting company in June was INetU, which offers dedicated managed hosting services from data centers with resilient networks, backup power and strong physical and network security. InetU also offers compliance and consultancy services to customers around the world.

Third this month was New York Internet. NYI offers colocation, dedicated servers and virtual hosting from data centers in New York. The company focuses on reliability and technical support that is responsive round the clock.

Half of the sites in the top ten in June were running Linux, four were running FreeBSD, and one was running Windows Server 2003.

Netcraft measures and makes available the response times of around forty leading hosting providers' sites. The performance measurements are made at fifteen minute intervals from separate points around the internet, and averages are calculated over the immediately preceding 24 hour period.

From a customer's point of view, the percentage of failed requests is more pertinent than outages on hosting companies' own sites, as this gives a pointer to reliability of routing, and this is why we choose to rank our table by fewest failed requests, rather than shortest periods of outage. In the event the number of failed requests are equal then sites are ranked by average connection times.

Information on the measurement process and current measurements is available.

July 2011 Web Server Survey

In the July 2011 survey we received responses from 357,292,065 sites.

Apache gained a further 10.8 million sites this month, taking its total up to 235 million and increasing its leading market share by nearly a whole percentage point to 65.9%. OVH, who saw massive growth of 8.7M hostnames last month, gained a much smaller but still significant 1.5M this month. The largest growth was exhibited by Softlayer, gaining 3.5M.

Microsoft IIS is now used by more than 60 million websites, a growth of 1.9M hostnames, capturing 16.8% of the market. Though most of these sites are served directly from Windows computers, fronting Windows machines with an F5 BIG-IP load balancing device remains a popular option and is used on around 8% of Microsoft IIS sites. Microsoft themselves serve nearly half a million hostnames on IIS through BIG-IP, for example VPLS, Inc., who saw a big drop of 1.5M last month, saw the biggest growth this month, adding 800k hostnames and more than doubling their total.

Despite gaining 689k sites, nginx's share fell slightly this month to 6.54%. Google suffered a slight loss last month, and also experienced the largest loss this month, with its total falling by a further 317k sites.

Total Sites Across All Domains
August 1995 - July 2011

Total Sites Across All Domains, August 1995 - July 2011

Market Share for Top Servers Across All Domains
August 1995 - July 2011

Graph of market share for top servers across all domains, August 1995 - July 2011

DeveloperJune 2011PercentJuly 2011PercentChange
Continue reading

StartSSL suspends services after security breach

StartSSL has suspended issuance of digital certificates and related services following a security breach on 15 June. A trademark of Eddy Nigg's StartCom, the StartSSL certificate authority is well known for offering free domain validated SSL certificates, but also sells organisation and extended validation certificates.

More than 25 thousand websites in Netcraft's SSL survey use certificates issued by StartSSL. These are recognised by Internet Explorer, Firefox, Chrome and other mainstream browsers.

StartSSL is not alone in offering free certificates. AffirmTrust recently trumped StartSSL's one-year certificates with its own offer of free three-year domain validated SSL certificiates. Coincidentally, AffirmTrust announced its launch on the same day as the StartSSL security breach.

StartSSL is also not the only certificate authority to come under attack this year. In March, Comodo came under attack through three of its resellers. By compromising a GlobalTrust website, the so-called ComodoHacker managed to fraudulently issue several valid certificates, including ones for the login pages of Yahoo and Skype. These certificates were subsequently revoked and browser software was updated to explicitly blacklist them.

LulzSec fuels growth at CloudFlare

Nine months after its launch, content distribution network CloudFlare is now used by more than 40 thousand sites in Netcraft's web server survey. The company announced its public beta at TechCrunch Disrupt in September 2010, where it came in as a close runner-up. Despite not winning, CEO Matthew Prince later described how Disrupt brought his team together and resulted in an increase in signups without having to carry out any additional PR or marketing.

CloudFlare also gained customers after recent praise from LulzSec, who use the service to run their website at LulzSec have accrued more than 200 thousand followers on Twitter as a result of their attacks against high-profile targets such as Sony, Fox, PBS and the X Factor.

When a website uses CloudFlare, client requests are made to a global network of edge nodes rather than to the website itself. This can increase performance, particularly when an edge node is located somewhere that can respond faster than the website's original hosting location.

By monitoring site traffic, CloudFlare can also offer some protection against denial of service attacks. When malicious traffic is detected, it can be automatically blocked at the edge nodes, before the traffic hits the website. Matthew Prince reported some DDoS attacks against CloudFlare yesterday, but noted that the service had not been impacted.

However, AnonNews used to be a prominent user of CloudFlare until the service was disabled after a DDoS attack affected the CloudFlare network. With traffic instead being routed directly to the server hosting, it has been seemingly unable to withstand the current series of attacks against it. The domain is registered to Sven Slootweg, who told Netcraft, "They had to turn it off on my domain for the past few days because of a really large DDoS attack." He added, "It apparently seriously affected their network. There is one or more Turkish patriot hacker groups constantly attacking AnonNews."

Nonetheless, CloudFlare's growth is continuing at a strong rate. The accessibility and cost of the service is undoubtedly playing a large part in this success – no contracts are required, and users can either sign up for free, or pay only $20 per month for a Pro account which offers better performance, advanced security protection and real-time stats. CloudFlare will also be offering an enterprise service soon.

SOCA back online after DDoS attack

The UK Serious Organised Crime Agency (SOCA) is back online after a distributed denial of service (DDoS) attack by LulzSec forced the agency to take their website offline yesterday.

A SOCA spokesman told BBC News that the agency had chosen to take its website offline to limit the impact on other clients hosted by their service provider, Connect Internet Solutions.

The agency – which is responsible for pro-active operations against serious and organised crime – was targeted as part of Operation Anti-Security (#AntiSec), which was announced on Sunday. The top priority of the operation is to "steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments."

With reference to its DDoS capabilities, LulzSec also added: "If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood." under attack?

The website of the Supreme Leader of Iran, Sayyid Ali Khamenei, has been responding very slowly or not at all for most of the day, which is often symptomatic of a distributed denial of service (DDoS) attack. However, with nobody claiming responsibility for such an attack – which is rather unusual lately – there could well be a less nefarious reason for the problems.

Earlier this year, the 'hacktivist' group Anonymous orchestrated a DDoS attack against in support of Operation Iran, which accused Iran of operating an illegal regime for the past 32 years. This attack was not successful, but a separate attack against the Islamic Republic of Iran Broadcaster ( did appear to succeed.