Definitely looks like a spam campaign. So far all accounts signed up from the same ISP. Here's a script you can paste in your rails console to find all users from IP ranges belonging to that ISP (assuming I didn't miss any):
To get to the rails console, run this in /home/mastodon/live as the mastodon user:
RAILS_ENV=production bundle exec rails c
You might also want to temporarily ban those IP ranges if the sign-ups don't stop. I did.
Here's a slightly revised CIDR list that seems to cover all the IPs used by the spammers so far:
(some CIDRs are redundant because they're from different sources)
Hopefully that'll do for now.
@pfigel Is there an easy way to put that into iptables or maybe nginx?
I don't have anything with iptables to hand to try this out with (my stuff all runs nftables), but here's the rough idea:
If someone more familiar with this stuff can verify what I wrote is sane, I'd be grateful!
@pfigel Sidenote but - I hope there is a nice list :3
Here's a version of the block list you can dump in your nginx to get rid of the bots:
The advantage of using nginx here instead of your firewall/iptables is that you'll have an easier time checking for false-positives in logs (in case I fucked up); the bots follow a predictable pattern (GET / then GET /auth/sign_up) while real traffic would stand out.
@pfigel Are they solving a CAPTCHA successfully? (not that you should use one; just curious)
You can find here also another way of blocking the signup:
Could be expanded if needed to add automatically the domain to the blocklist.
mastodon.at is open to all users and federates with most instances.
🇩🇪 🇦🇹 🇨🇭 mastodon.at ist offen für alle User und ist mit vielen anderen Instanzen verbunden.