Wikipedia talk:WikiProject on open proxies

Corporate VPNs
We have been quite inconsistent with blocks on corporate VPNs like McAfee WGCS or Zscaler. Sometimes they are blocked, sometimes they are not. I wonder what are your thoguths on this? I think a few of the options would be: The rationale for treating them in a different way is that these are sometimes the default connection option at some workplaces, and their usage is beyond control by the user when they are connecting from that location, so I think hardblocks might be undersirable. I would lean towards blocking all of them as anon. only if we have regularly seen them abused, but I'm not sure that happened. MarioGom (talk) 22:51, 25 September 2023 (UTC)
 * Block all of them.
 * Block all of them, anon. only.
 * Block only when abused.


 * If we're to block em, my preference would be to softblock. It reduces the risk of disruptive edits by anon editors, while still allowing established accounts to edit from the same connection. I also think it would be beneficial to have some consistency here. I know the corporate VPN providers like Zscaler have a lower risk when compared against other more consumer oriented services, but there is still disruption that occurs there. 165.225.192.0/18 has a few recent examples of disruptive edits from individual IPs within the range, despite first being reported here back in May 2023. Sideswipe9th (talk) 00:32, 19 December 2023 (UTC)
 * I think softblocks where there has been disruption is the way to go, which will permit logged-in editors to edit using a corporate gateway while preventing disruptive edits from anons. Malcolmxl5 (talk) 01:08, 25 April 2024 (UTC)

Help with Teahouse/Help desk abuse
For the past two days, we've had to temporarily semi-protect the Teahouse and Help desk due to a proxy-hopping vandal. My savviest approach has been to block the proxy IPs and implement one-hour protection. We'd generally prefer to not protect those pages, since they're places for new and unregistered users to get support. Can those with more know-how suggest a better approach? List of IPs in the collapsed section below.

Firefangledfeathers (talk / contribs) 15:06, 28 June 2024 (UTC)
 * 108.188.145.113
 * 14.54.233.128
 * 49.228.177.11
 * 119.229.16.50
 * 58.187.25.244
 * 14.36.196.175
 * 182.235.231.66
 * 77.34.250.60
 * 119.192.208.114
 * 112.71.247.70
 * 76.82.175.66
 * 118.69.162.170
 * 79.132.13.234
 * 124.158.125.196
 * 42.113.126.166
 * 187.126.28.93
 * 23.93.101.181
 * 81.2.17.144
 * 27.82.8.78
 * 184.22.106.75