Ok - Here is the reply I got from deSEC:
This is caused by the fact that hundreds of clients send updates at xx:xx:x0 00:00. We only accept about 60 simultaneously processed updates, so most of them get this error.
To prevent this, we recommend randomizing the update time, or at least set it to some non-special time manually.
Looking more closely at the cloudron logs and despite the somewhat random nature of the change of public IP when not having a fixed IP address, it looks like Cloudron triggers DNS checks/update almost exclusively on xx:xx:x0
[image: 1778517452854-5487c5c9-d317-47c8-aff3-5b33b4cd7b13-image.jpeg]
Could it be possible to randomize this further ?