Yes, on April 7th, Rdbhost.com was using the broken OpenSSL implementation.
On 8 April, that was corrected, and a couple days ago the private keys were replaced on the server so that that vulnerability is no longer present.
If you have any valuable content in your Rdbhost account, please change your passwords, and also reset your authcode.
Resetting the authcode is done from the Roles Manager page after you login, using the 'Reset Authcode' button in the right margin of the page.
If your app uses OpenID for user logins, your users do not need to revise passwords, as the security of OpenID was not compromised by the Heartbleed exploit.