Definitely yes!
Proxies, Tor and VPNs can be used by malicious visitors to hide their identity and carry out nefarious activities online.In fact, these tools are in almost all cases used by cybercriminals to cover their tracks and avoid detection.
A cybercriminal might use a proxy server to hide their IP address and location when carrying out a phishing attack or distributing malware. They might use a VPN to encrypt their traffic and avoid detection when carrying out a hacking operation or stealing sensitive data.
When you block such connections it ensures:- You can deter adversaries from causing trouble in services or applications.
- You can help combat spam and prevent fraud.
- All automatic malicious website attacks are stopped.
- Hacker must reveal his idendity to attack you. Who does it?
- It will strengthen and accelerate your KYC (know your customer) process.