tip: If you have access to your server's command line and the nginx config, you can block requests from bad-actor servers (like

In /etc/nginx/, create blockips.conf.

Edit nginx.conf. In the http{} block, add this line:

include blockips.conf;

Use the ping to get the IP address associated with the domain name of the remote server.

In blockips.conf, add this line:


where xxx... is the IP address you just got.

Restart nginx.

In the future, if there's another server you want to block, you can just repeat the last three steps (get IP, add 'deny' line, restart nginx).

Show thread

@noelle this doesn't work for, it's behind cloudflare

@noelle i should prob write a masto resolver just for those instances

@noelle oh, weird
here's some that are less wellknown - kf - gab

@noelle couldn't this this type of block be a little bit over boarding? Eventually a bad actor could create a spammy instance on a shared hosting with only limited IP addresses.. Don't know of this configurations are around in the wild thou ...

Sign in to participate in the conversation
Elekk: Mastodon for Gamers

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!