Security Settings
Security Settings help protect your form from spam, bots, and unauthorized access. Configure IP blocking, honeypot fields, and website restrictions to enhance your form's security.
Accessing Security Settings
Navigate to any form, click "Settings" in the navigation menu, then select "Security". You'll see security options organized in cards.
Security settings require appropriate permissions. Contact the form owner if you don't see these options.
Website Restrictions
Control which websites can submit to your form:
- Allowed Domains: Specify domains that are permitted to submit
- Format: Enter domains separated by commas (e.g.,
example.com, www.example.com)
Website restrictions check the Origin header of submissions. This helps prevent unauthorized sites from submitting to your form.
Use website restrictions when you want to ensure only your website can submit to the form. Leave empty to allow submissions from any origin.
IP Blocking Rules
Block specific IP addresses from submitting to your form:
- Blocked IPs: Enter IP addresses or IP ranges to block
- Format: One IP per line or comma-separated (e.g.,
192.168.1.1or192.168.1.0/24)
You can also block IPs directly from the Submissions page by clicking "Block IP" on any submission.
Be careful when blocking IP ranges, as this may block legitimate users. Consider blocking individual IPs first.
Adding IPs to Block List
Identify the IP Address
View a spam submission's details to find the IP address in the metadata section.
Add to Block List
Go to Security Settings and add the IP address to the IP Blocking Rules field. You can add multiple IPs separated by commas or new lines.
Verify Blocking
Test by attempting a submission from the blocked IP. It should be rejected immediately.
Honeypot Field
Configure a honeypot field to catch automated bots:
- Field Name: The name attribute for your hidden honeypot field
- Default:
_trap(you can customize this)
Honeypot fields are invisible to users but visible to bots. When a bot fills out the honeypot field, the submission is automatically rejected.
How Honeypot Works
- Add Hidden Field: Include a hidden input field in your form with the configured name
- Bot Detection: Bots often fill out all fields, including hidden ones
- Automatic Rejection: Submissions with the honeypot field filled are rejected
Example Implementation
Add this to your HTML form:
<!-- Honeypot field (hidden from users) -->
<input type="hidden" name="_trap" />The honeypot field name can be customized in Security Settings. Use a name that looks legitimate to bots but won't conflict with your actual form fields.
Security Best Practices
- Enable Spam Protection: Use AI-powered spam detection in General Settings
- Use Honeypot: Add honeypot fields to catch basic bots
- Block Persistent IPs: Block IPs that repeatedly send spam
- Restrict Websites: Limit submissions to your authorized domains
- Monitor Submissions: Regularly review spam submissions to identify patterns
Security is most effective when using multiple layers. Combine spam protection, honeypot, IP blocking, and website restrictions for best results.
Understanding Security Layers
Basestack Forms provides multiple security layers:
- AI Spam Detection: Automatically identifies spam submissions
- Honeypot: Catches bots that fill out hidden fields
- IP Blocking: Prevents specific IPs from submitting
- Website Restrictions: Limits submissions to authorized domains
Each security layer catches different types of threats. Using all layers together provides the strongest protection.
Troubleshooting
Legitimate Submissions Being Blocked
If legitimate users are being blocked:
- Check IP Blocking: Review your blocked IP list
- Verify Website Restrictions: Ensure your domain is in the allowed list
- Review Spam Detection: Check if submissions are being incorrectly flagged as spam
Too Much Spam Getting Through
If spam is still getting through:
- Enable All Security Layers: Use spam protection, honeypot, and IP blocking together
- Block Persistent IPs: Identify and block IPs that send spam
- Review Patterns: Look for patterns in spam submissions to identify new threats
Next Steps
- Configure General Settings: Set up form status, data retention, and webhooks
- Review Submissions: Monitor spam submissions and block problematic IPs
- Learn About Spam Protection: Understand how spam detection works