How to Block VPN and Data Center IP Submissions in Jetpack Forms?

Jetpack

Jetpack Forms cannot automatically block VPN or data center IP submissions on its own. To stop this type of spam reliably, you must add a third-party IP intelligence layer or use a network firewall. This guide  explains what Jetpack Forms can and cannot do, then walks through three practical methods, starting with the safest and most effective approach for form-level protection.

Why VPN and Data Center Spam Gets Through Jetpack Forms

Jetpack Forms is designed to be lightweight and easy to use. It focuses on content-based spam detection, not IP reputation analysis.

That means Jetpack Forms does not natively identify:

As a result, submissions coming from AWS, Google Cloud, Azure, or commercial VPNs often look “clean” to basic filters. They pass through unless you add an external layer that understands where traffic is coming from.

This is not a flaw. It is a scope decision. Jetpack relies on complementary tools to handle advanced abuse patterns.

What Jetpack Forms Can Do Natively

Before adding anything new, it helps to understand Jetpack’s built-in limits.

Jetpack Forms can:

Jetpack Forms cannot:

This distinction matters. VPN and data center IPs change constantly. Manual lists do not scale.

Method 1: Use OOPSpam for Jetpack Forms

This is the most practical solution if your goal is to stop spam submissions while keeping your website accessible to real users.

OOPSpam Anti-Spam (that’s us 👋) works at the form submission level. It evaluates each Jetpack Forms submission before it is saved and checks it against continuously updated threat intelligence. Legitimate visitors can still browse your site normally.

Why OOPSpam Works Well with Jetpack Forms

OOPSpam fills the exact gap Jetpack leaves open.

It detects and filters:

Because filtering happens when the form is submitted, spam never reaches your Jetpack Forms inbox.

How to Set Up OOPSpam with Jetpack Forms

The setup is straightforward and does not require custom code.

OOPSpam

First, install and activate OOPSpam Anti-Spam from the WordPress Plugin Repository.

OOPSpam dashboard

Next, create an account on the OOPSpam and generate an API key from your dashboard.

Paste the API key

Then, go to OOPSpam → General Settings in your WordPress admin. Paste your API key and save.

Jetpack Form Protection

Under the same settings screen, make sure Activate Spam Protection is turned on and that Jetpack Forms is enabled for protection.

IP Filtering tab

Finally, open the IP Filtering tab. Enable:

Save your changes. From this point on, Jetpack Forms submissions from VPNs and data centers are filtered automatically.

This approach requires no IP list maintenance and no ongoing rule updates.

Optional: Use Manual Moderation for Repeat Abuse

OOPSpam Manual Moderation

Inside OOPSpam → Manual Moderation, you can take targeted action without tightening global rules or risking false positives.

You can manually:

This is best used for persistent or borderline spam, not as a replacement for automated detection. Manual moderation works well when abuse is consistent but does not clearly match VPN or cloud provider rules.

Method 2: Use Cloudflare Security Rules

If your site already runs on Cloudflare, you can block VPN and cloud traffic at the network edge. This stops unwanted traffic earlier, but it also has broader consequences.

This method is powerful, but it is not form-specific.

Cloudflare Security Rules

How to Create a Cloudflare ASN Rule

  1. Log in to Cloudflare and select your website.
  2. Go to Security → Security Rules → Custom rules and create a new rule.
  3. Match incoming traffic by AS Num. For example, Amazon AWS uses ASN 16509.
  4. Choose an action. Start with Managed Challenge. Use Block only when you are confident the rule will not affect legitimate users.
  5. Name the rule clearly and deploy it.

This blocks traffic from entire cloud networks. It is effective, but it may also block real users on corporate networks or privacy-focused VPNs.

Jetpack’s Built-In Firewall (Manual Option Only)

Jetpack includes a manual IP blocking feature inside its firewall. This is useful for repeat offenders but not for dynamic infrastructure-based spam.

How to Block IPs in Jetpack Firewall

Jetpack’s Built-In Firewall

  1. Go to Jetpack → Settings → Security → Firewall.
  2. Enable Manual rules – Block specific IP addresses from accessing your site.
  3. Enter IP addresses using commas, spaces, or new lines. Jetpack supports IPv4, IPv6, CIDR notation, and IP ranges.
  4. Click Save block list.

This works when you already know which IPs are abusive. It does not automatically update and is not practical for VPN or data center blocking at scale.

Choosing the Right Approach for Jetpack Forms

Final Takeaway

Jetpack Forms alone cannot stop VPN and data center spam. That protection lives outside its core feature set.

The safest and most targeted solution is to add a form-level IP intelligence plugin like OOPSpam. It blocks abusive infrastructure without locking out real visitors. Network-level tools like Cloudflare are powerful, but they should be applied deliberately.

When spam evolves, static defenses fall behind. Automated reputation-based filtering is what keeps Jetpack Forms usable long term.

Spam Protection for WordPress, Zapier, Make and more.

Since our launch in 2017 we’ve been perfecting our API to be the trusted option for small businesses to enterprise— and continue to stick to our values of being the accessibility and privacy-friendly option. Give us a shot!

Try OOPSpam for free → Try our WordPress plugin for free →

✓ No credit card required ✓ Cancel anytime

Enjoy Reading This Article?

Here are some more articles you might like to read next: