Blocking Malicious IP Addresses and E-mails

Nadles provides built-in tools to protect your API from unwanted traffic and fraudulent signups. From the My Settings section, you can block requests based on IP addresses or e-mail addresses. Changes take effect immediately after saving.
Quick Reference — Blacklist Syntax
Blacklist Type | Format | Special Notes | Example |
IP Blacklist | One IP or subnet per line | Comments allowed, start with # or // | 192.168.1.15 |
E-mail Blacklist | One address or pattern per line | Regular expressions start with re! ; no comments allowed | spammer@example.com |
IP Blacklist
The IP blacklist blocks requests from specific IP addresses or entire subnets.
Each entry must be on its own line.
You can:
- Block single IPs (
192.168.1.15
) - Block IP ranges using CIDR notation (
10.0.0.0/8
) - Add comments with
#
or//
to describe the entry
Examples
192.168.1.15
10.0.0.0/8
# Block known malicious IP from last incident
203.0.113.45
// Block VPN range
198.51.100.0/22
E-mail Blacklist
The e-mail blacklist prevents signups or authentication from specific e-mail addresses or patterns. Each entry must be on its own line.
You can:
- Block exact e-mail addresses (
spammer@example.com
) - Block patterns with regular expressions — start the line with
re!
- Comments are not allowed in this field
Examples
spammer@example.com
re!^.*@disposablemail\.com$
re!^(fake|spam)user\d+@example\.org$
How It Works
- IP blacklist: Requests from listed IPs are blocked at the gateway level before reaching your backend.
- E-mail blacklist: Blocks signup and authentication attempts from listed addresses or matching patterns.
- Immediate effect: Updates are applied as soon as you save changes in My Settings.
Tips for Effective Blacklisting
- Use CIDR notation to efficiently block entire IP ranges.
- Maintain a list of disposable e-mail domains and block them with a single regex.
- Combine with rate-limiting in Nadles for an extra layer of protection.
- Periodically review and update your blacklists to remove outdated entries.
- Keep regex patterns efficient — overly complex expressions can slow validation.
Sample Regex Patterns for Disposable E-mail Domains
You can paste these directly into your E-mail Blacklist field.
Remember: each regex must be on a separate line and must start with re!
.
1. General Disposable E-mail Services
re!^.*@(mailinator\.com|10minutemail\.com|temp-mail\.org|guerrillamail\.com|dispostable\.com|trashmail\.com|yopmail\.com|getnada\.com|dropmail\.me|fakeinbox\.com|mytemp\.email)$
2. Popular Disposable Domains (Global)
re!^.*@(temp-mail\.io|moakt\.com|emailondeck\.com|spambog\.com|inboxbear\.com|mohmal\.com|throwawaymail\.com|maildrop\.cc|spamgourmet\.com)$
3. GuerillaMail & Variants
re!^.*@(spambox\.us|mailnesia\.com|sharklasers\.com|guerillamailblock\.com)$
4. European Temporary Mail Providers
re!^.*@(jetable\.org|spam4\.me|inboxkitten\.com|getairmail\.com|mailcatch\.com|anonaddy\.me|trashmail\.me)$
5. Miscellaneous Throwaway Domains
re!^.*@(tempemail\.co|tempinbox\.com|tempomail\.com|emailtemporanea\.com|temporarymail\.com|temp-mailbox\.com|tempr\.email|oneml\.com|mail-temporaire\.fr|pokemail\.net)$
6. Privacy Relay & Forwarding Services
re!^.*@(spamex\.com|burnermail\.io|shortmail\.com|filzmail\.com|binkmail\.com|letthemeatspam\.com|mailnull\.com)$