Good point. Servers were located in OVH/France until yesterday. I move machines to OVH from Linode after previous DDoS attacks year ago. These days, sales representative at OVH promised me that they'll actively help me with DDoS attacks, because they have great infrastructure and skilled admins.
The reality of recent days was that they were even worse than Linode guys, because at Linode I was able to create multiple machines dynamically and mitigate DDoS by moving pool around many IPs. In OVH I had multicore machines with dozen of IPs, and I was prepared to mitigate DDoS by filtering the traffic by strong hardware and by routing traffic all around many of private IPs.
But.
These idiots at OVH blocked ALL these IPs at once since attacks started, claiming that the attack is affecting other customers. So I paid overpriced infrastructure for many months just for *nothing*. The only "solution" they offered me were Cisco firewalls, able to filter DDoS up to throughtput of 400 Mbit/s (excuse me??). When I rejected this offer, they simply rebooted my machines to "rescue mode", telling me that my servers are damaging their infrastructure and asking me to move my machines away.
So - never ever OVH.
Yesterday I migrated the pool to Amazon EC2, that's why the pool was completely offline for some time. I selected datacentres in USA, because they have the best infrastructure so far, and that's why you see higher latencies than "usual". But this is just a temporary problem, I'm configuring more machines around all Amazon datacentres (USA, Europe, Asia, ...) and I'm preparing smart routing algorithm, which will automatically move your miner to the closest pool endpoint.
I'm keeping all this very seriously, but it is hard to mitigate DDoS when you depend on group of impotent idiots at OVH which are able to send you only prefabricated template reports "your server is having issues, we restarted it / null routed all IPs".