• Resolved Jamie

    (@digitalchild)


    Hello,

    I have a form that requires users to be logged in to even load it, however I’m still getting thousands of spam tickets coming through. I block the IP at the server level and then the spammer goes away, but every few weeks they return and do the same thing.

    It would be good if we could block domain names from the email address field and also include a capture field for fallback when honeypot fails.

    Thanks,

    Jamie.

Viewing 2 replies - 1 through 2 (of 2 total)
  • garethjonesthanyapura

    (@garethjonesthanyapura)

    Hi Jamie
    I had this issue with my Zendesk too, I ended up blocking the domain inside Zendesk itself. You can blacklist an entire domain in your settings:

    https://support.zendesk.com/hc/en-us/articles/203663286-Using-the-whitelist-and-blacklist-to-control-access-to-Zendesk-Support

    Hope that helps!
    Gareth

    Plugin Author pipdig

    (@pipdig)

    Hi Jamie, sorry for the slow reply! We stopped receiving notifications of posts in this forum for some reason. So we’re just catching up now.

    I’m almost certain that the spam messages won’t be coming from the WordPress plugin. Is there a form also live on your Zendesk support site? Or has that been disabled at all?

    If the Zendesk form on WordPress is only available to logged-in users, then it would not be possible for automated spam to trigger the action to send the message via the form.

    If your primary form of contact is on the WordPress site, I’d recommend disabling the form on Zendesk itself. This should see a reduction in spam hopefully.

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘Honey pot method fails’ is closed to new replies.