Anyone else seeing spammy-looking signups from QUALITYNETWORK IP ranges?

Definitely looks like a spam campaign. So far all accounts signed up from the same ISP. Here's a script you can paste in your rails console to find all users from IP ranges belonging to that ISP (assuming I didn't miss any):

To get to the rails console, run this in /home/mastodon/live as the mastodon user:

RAILS_ENV=production bundle exec rails c

You might also want to temporarily ban those IP ranges if the sign-ups don't stop. I did.


Here's a slightly revised CIDR list that seems to cover all the IPs used by the spammers so far:

(some CIDRs are redundant because they're from different sources)

Hopefully that'll do for now.

@pfigel Is there an easy way to put that into iptables or maybe nginx?

@Gargron @pfigel I'd recommend using an ipset for these if it's an option, it's slightly safer/efficient-er than adding entries into the main tables

@flussence @pfigel It would be useful to add some guidance to the Mastodon documentation for situations like this

@Gargron @pfigel
I don't have anything with iptables to hand to try this out with (my stuff all runs nftables), but here's the rough idea:

If someone more familiar with this stuff can verify what I wrote is sane, I'd be grateful!

@pfigel Sidenote but - I hope there is a nice list :3

Here's a version of the block list you can dump in your nginx to get rid of the bots:

The advantage of using nginx here instead of your firewall/iptables is that you'll have an easier time checking for false-positives in logs (in case I fucked up); the bots follow a predictable pattern (GET / then GET /auth/sign_up) while real traffic would stand out.

cc @Gargron

Sign in to participate in the conversation
Mastodon is open to all users and federates with most instances.

🇩🇪 🇦🇹 🇨🇭 ist offen für alle User und ist mit vielen anderen Instanzen verbunden.