Authvaultix
    Pages
    • Overview
    • Dashboard
    • Pages
    • API
    • Applications
    • Users
    • Subscriptions
    • Licence
    • Chatroom
    • Manage Accounts
    • seller keys
    • Seller Logs
    • Global Variables
    • User Variable
    • Sessions
    • Files
    • Blacklist
    • Whitelist
    • Webhooks
    • Logs
    • Audit Logs
    • Account
    • Settings
    • Forms
    • Upgrade
    • Bug Bounty
    Discord
    Github

    Whitelist

    Whitelist#


    IP Whitelist means allowing access to your application only from approved (trusted) IP addresses.
    So if the whitelist is enabled/required, only the IPs added to the list will be able to use login/init/API — everyone else will be blocked.

    Where Can You Use This Feature?#


    1) Private / Internal Apps (Team-only access)#

    If your app is only for your team/staff (not public users), you can add your team’s fixed IPs to make the app private.
    • Admin panel / staff tools
    • Internal dashboards
    • Company/private software

    2) Office / Home Network Lock#

    You can restrict the app so it runs only from your office/home network.
    Example:
    • Add the office static IP
    • Any request coming from outside the office network will be denied

    3) VPN / Proxy Control (Trusted VPN only)#

    If you want users to be allowed only from your approved VPN IPs:
    • Whitelist your VPN server’s IP
    • Tell users: “Login only using this VPN”

    4) Hard-secure Admin/API Endpoints#

    Restrict sensitive endpoints (webhook panels, admin APIs, file distribution links) to trusted IPs only.
    This reduces brute force and scanning attacks.

    5) Reseller/Partner Restricted Access#

    If a reseller/partner has a fixed server IP, you can whitelist only that IP to restrict access.

    What Happens When You Use It?#


    1) Extra Security Layer#

    It adds an additional check on top of Password/License:
    • Correct login + allowed IP = access granted
    • Correct login but IP not allowed = blocked

    2) Prevents Unauthorized Access / Leaks#

    Even if a loader or credentials get leaked, access from unknown IPs will still be blocked (when whitelist enforcement is enabled).

    3) Reduces Attack Surface#

    Random bots, scanners, and brute-force attempts can be dropped early.

    What’s Included in This UI?#


    • Search — filter by IP or reason text (pressing Enter sends a search parameter in the URL)
    • Rows limit — 10/25/50/100 entries per page
    • Add IP — add a new whitelist entry via the modal (#addIpModal)
    • Delete single — delete from the 3-dots menu / right-click context menu on each row
    • Delete All — top button (with confirmation)
    • Pagination — Prev/Next pages when there are many entries

    Important Notes#


    • Static IP is best — if a user’s IP changes frequently (mobile data), they may get locked out by the whitelist.
    • Perfect for office/VPN use cases where the IP stays fixed.
    • Reason field is optional, but recommended (so you remember later why the IP was added).

    Example Use Cases#


    • Office VPN: 203.0.113.10 (Reason: Office VPN)
    • Admin Home: 198.51.100.22 (Reason: Admin Home Static)
    • Partner Server: 192.0.2.50 (Reason: Partner API Server)
    Modified at 2026-03-04 16:41:54
    Previous
    Blacklist
    Next
    Webhooks
    Built with