How to Block VPN and Data Center IP Submissions in MetForm?

MetForm

MetForm cannot block VPN or data-center IPs by itself. To stop anonymous network abuse, you must add a security layer, either at the form level (OOPSpam) or at the network edge (Cloudflare Firewall).

Below are the simplest and most reliable methods for MetForm users.

Why MetForm Needs Help Blocking VPN and Data Center IPs

Attackers hide behind VPNs and cloud-server IPs because they want anonymity. MetForm does not detect these sources by default. Modern spam networks use:

Bot operators also mix in residential proxies and human-assisted form spam. Simple CAPTCHAs are not enough. A layered defense is required: IP intelligence, behavioral filters, and rate-limits.

Effective Ways to Block VPN & Data Center IPs in MetForm

You have two practical methods:

Both approaches filter hidden bot traffic and protect your form leads.

OOPSpam (that’s us 👋) offers the simplest and most automated way to block VPNs and data-center traffic in MetForm. It works directly inside WordPress and silently filters submissions before they reach your inbox.

Use this if: you want a plug-and-play solution without maintaining manual firewall rules.

Enable OOPSpam Protection for MetForm

Go to Plugins → Add New. Search OOPSpam Anti-Spam,install and activate.

OOPSpam Anti-Spam

Create an account on the OOPSpam dashboard and copy your API key.

OOPSpam dashboard

Go to WordPress Admin → OOPSpam → General Settings and paste your key.

OOPSpam General Settings

Turn on MetForm Spam Protection and click Save Changes.

MetForm Spam Protection

Enable VPN & Cloud-Server Blocking

Inside OOPSpam settings and open the IP Filtering tab:

 OOPSpam settings IP Filtering tab

OOPSpam will now:

OOPSpam works automatically, so you don’t have to maintain IP lists or tune firewall rules. When you need control, you can switch to manual moderation and add your own allow/block IP rules. This keeps routine filtering hands-off while giving you moderation options when cases are borderline.

Manual moderation

Method 2: Block VPN & Data Center IPs with Cloudflare Firewall

Cloudflare blocks suspicious traffic before it reaches your site. This is useful if you already use Cloudflare and want network-level filtering.

Create Firewall Rules

Create Firewall Rules

  1. Log in to Cloudflare
  2. Select your website
  3. Go to Security → WAF → Custom Rules
  4. Click Create Rule
  5. Name the rule: Example: Block AWS ASN 16509
  6. Rule condition example:
    • Field: AS Num
    • Operator: equals
    • Value: 16509 (AWS ASN)

Expression preview example: (ip.geoip.asnum eq 16509)

  1. Action: Block (or Challenge first if testing)
  2. Save

This rule blocks requests from AWS data-center IPs, a common source of automated spam traffic.

Cloudflare gives powerful edge-level control. However, it requires tuning. If you want automatic VPN & data-center filtering with no manual rules, OOPSpam is easier.

Best Practice: Use Both Layers if Possible

For the best results:

Layer Purpose
Cloudflare WAF Blocks anonymous networks before they reach WordPress
OOPSpam Advanced form-level filtering + ML scanning + rate limiting

This combination stops automated abuse and human-assisted spam.

Final thoughts

As bots adopt anonymous networks and automation tools, advanced filtering is necessary. Use OOPSpam for reliable plug-and-play protection, and add Cloudflare Firewall Rules if you need deeper control at the network edge. This simple configuration protects your forms, keeps your inbox clean, and preserves legitimate leads.

Spam Protection for WordPress, Zapier, Make and more.

Since our launch in 2017 we’ve been perfecting our API to be the trusted option for small businesses to enterprise— and continue to stick to our values of being the accessibility and privacy-friendly option. Give us a shot!

Try OOPSpam for free → Try our WordPress plugin for free →

✓ No credit card required ✓ Cancel anytime

Enjoy Reading This Article?

Here are some more articles you might like to read next: