It's - still - all good here, I see multiple peaks of malicious traffic in my graphs.. all last about 10-15 mins while the attacker tries to get around the mitigation but nothing heavy which really hit the server hard... The attacker is using wordpress pingback attacks and udp floods etc.. Looks like someone is hiring a Stresser/Booter as the times those floods are going are pretty much exactly 60 minutes.. or 120 minutes.. or 180 minutes..
If you're still having trouble connecting, let me know where you're connecting from and I'll open a ticket with my provider otherwise I'd just recommend to spread hash around as a failover/failsafe method.
I cant load zen, zcl and hush pools for at least last 2 hours.
Zec is working normal.
I'm in europe
My shares at suprnova held through the attack... just front end was unavailable until an hour ago and now seems fine... got expected coins on hand.