Service Status

Here at 123-reg we know you are busy so always check here before contacting us if something is wrong with your services. Here you will find all updates on what’s really going on and what we are doing about it to make sure your service is back to normal!

If you can’t find your issue here please feel free to open a support request. Just log in, then select Ask A Question. Day or night, we're here to help – and you can see a complete history of all your previous messages.

Subscribe to RSS

Current Trackers

Email Access

Created: 14 April 2015, 18:01
Last Updated: 27 April 2015, 13:06

Some customers may be experiencing issues with access their mail services via local mail clients (Outlook, Apple Mail etc) and mobile devices.

Due to a recent internal update to increase stability of the platform if your incoming and outgoing mail settings were incorrect these will no longer work.

If previously you were using any of our incoming / outgoing mail servers for a different protocol than the one it has been intended for, further issues will be experienced (i.e. you have a POP email client connecting through our IMAP server, or the other way around).

Therefore please ensure that these settings are correct as per the following Support Article:

We also have the following guide with steps on how to update your server settings on some of the most popular clients and devices:

If you are using 123-reg Business Mail or Mobility please ensure your server is:

If you are still experiencing issues, please raise contact our support team via for further investigation and in the interim we strongly recommend you to use our web-based webmail interface at to access your mailboxes.

Apologies for any inconvenience caused!

Security Advisory: WordPress WP-Super-Cache plugin vulnerability

Created: 10 April 2015, 07:57
Last Updated: 10 April 2015, 12:20

Following a recently discovered vulnerability in one of the most popular WordPress caching plugins, we strongly recommend all customers using "WP-Super-Cache" to make sure they upgrade to the latest version, 1.4.4.

For more details about this vulnerability, please visit: