Can’t Access Your Site that is hosted with us?

Not being able to access your website is usually the result of one of the following:

1. Internet connectivity issues
2. The IP address of a customer was blocked due to incorrect login details (username/and or password) used AT LEAST THREE TIMES.

1. In the case of the first scenario, contact your local Internet Service Provider (ISP) as they are who you are paying for consistent, reliable access to the internet. If you can’t access other websites besides your own, it’s obviously a temporary problem with their network, or a localized problem near your home or office. Wind, rain, snow, etc, can cause such problems and your ISP may not be aware of these localized problems in their network unless you contact them.

2. Situation #2 here happens as a security measure to prevent unauthorized access to your site. Like in baseball, 3 strikes and you’re out, when you or someone else types in incorrect information to log into your site 3 or more times, the security software flags this as a possible hacker with malicious intent to safeguard you. We understand typos happen and people often forget passwords.

Should you be locked out due to multiple attempts to login to your site, please email us:

There is no charge to do this, we know mistakes can happen but the benefits outweigh the negatives of having this security protocol in place. In fact, you’ll notice many free social networking sites like Facebook also have similar lockout or verification processes to authenticate the actual intended user in the case of multiple incorrect login attempts or even logging in correctly from a different computer (IP address).

We realize this can be an inconvenience but you’ll gain an appreciation for having this safeguard when you think “how does this look to a computer?” It looks like someones trying to break into your site by guessing passwords. Log into your site from a friend or family member’s computer sometime or from a computer in a different country and you’ll be glad there’s authentication protocols built into the software preventing unauthorized access.