Feature summary
Currently, you can block an IP range either soft (anon only) or hard (include logged-in users). We need steps in-between those. For simplicity, the logical steps would be "block anon and unconfirmed accounts" and "block anon and non-extended-confirmed accounts", paralleling the choices available for page protection.
Use case(s)
We've been tracking a LTA (Long Term Abuse) case for a while, and keep blocking smallish IP ranges they've been using. We're down to them using a wide IPv6 mobile range which has been blocked "anon only, disallow account creation", but they seem to have a large bank of sleepers that they just keep waking up. We block them as soon as they're spotted, but we're losing the game of whack-a-mole.
Benefits (why should this be implemented?):
With the current IP range block choices, the next step up would be to hard-block the IP range they're using. We don't want to do that because it's a huge range with a large amount of other legitimate traffic. We've been looking at the possibility of writing some edit filter, but it's not yet clear if that's going to be an effective way to go.
Having the ability to block unconfirmed accounts on that range would be a really useful tool in cases like this.
See also T351031: Add an option for IP globalblocks to only apply to non-confirmed users for equivalent feature in global block.