How mentor.sh was flooded with spam signups and what we did to recover — a real story of bots, email limits, and reactive defense.
Recently, mentor.sh was flooded with over 25,000 fake user accounts — all created in just over an hour.
No trending post. No Hacker News spike. Just a flood of bots hammering our signup flow and filling our database with garbage.
Here's how it happened, what accidentally protected us, and what we've done since.
We noticed a sudden surge in signups — an exciting metric, until we saw the details:
mail7.io
Ironically, our savior was hitting the Mailtrap quota.
Our dev email infrastructure (Mailtrap) had reached its monthly limit — which meant no confirmation or welcome emails went out.
This prevented most spam accounts from being “activated” or having their phishing links delivered to real users. An unexpected, lucky fail-safe.
We reacted quickly:
We were lucky this didn’t go further — but we won’t rely on luck next time.
To prevent this kind of event from happening again:
We’re also investigating browser fingerprinting and anomaly detection to proactively flag bot-like behavior.
This wasn’t growth. This was a stress test.
We're glad it happened early in our journey — because it forced us to harden things we thought could wait.
If you're building a public-facing product, don't assume obscurity is protection. Bots don't care how big you are.
Stay safe — and secure — out there.
— The mentor.sh team