Skip to content

Commit c146fc3

Browse files
committed
Add note about in-app ip blocks to moderation guide
1 parent 3321e07 commit c146fc3

File tree

1 file changed

+17
-1
lines changed

1 file changed

+17
-1
lines changed

content/en/admin/moderation.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,23 @@ Spammers will often use different e-mail domains so it looks like they are using
8686

8787
### Blocking by IP {#blocking-by-ip}
8888

89-
It is not possible to block visitors by IP address in Mastodon itself, and it is not a foolproof strategy. IPs are sometimes shared by a lot of different people and sometimes change hands. However, it is possible to block visitors by IP address in Linux using a firewall. Here is an example using `iptables` and `ipset`:
89+
Blocking by IP is not a foolproof strategy. IPs are sometimes shared by
90+
different people and sometimes change hands. It's also possible to accidentally
91+
block a large IP range and cut off legitimate access. Be careful with either of
92+
these approaches.
93+
94+
#### IP Blocks
95+
96+
Use the "IP Rules" page within the moderation interface to create an IP-Address
97+
based block. You can block specific IPv4 or IPv6 address, or block entire ranges
98+
using the CIDR syntax. The instructions on the page will guide you through how
99+
long the block should last, and what severity the block should have within the
100+
application.
101+
102+
#### Firewall rules
103+
104+
It is also possible to block visitors by IP address in Linux using a firewall.
105+
Here is an example using `iptables` and `ipset`:
90106

91107
```bash
92108
# Install ipset

0 commit comments

Comments
 (0)