๐ŸŸข Network Status| First month from $2.00 โ€” fully managed | Contact Support
Skip to content
Need help? Real engineers available 24/7. Average response under 15 minutes. Open a support ticket โ†’

Firewall Rules & IP Blocking โ€‹

Imunify360 manages the server firewall automatically, but you can manually control the black list, gray list, and white list, and configure when automatic blocking triggers.

Accessing the firewall โ€‹

WHM โ†’ Plugins โ†’ Imunify360 โ†’ Firewall.

Manual IP management โ€‹

Blocking an IP (black list) โ€‹

Use this when you know an IP is malicious and want to block it permanently:

  1. Go to Firewall โ†’ Black List โ†’ Add
  2. Enter the IP address or CIDR range (e.g. 192.168.1.0/24 to block a /24 subnet)
  3. Add a comment so you remember why it was blocked
  4. Click Add IP

The IP is blocked immediately across all ports.

Unblocking an IP โ€‹

  1. Go to Firewall โ†’ Black List
  2. Use the search box to find the IP
  3. Click Delete next to it
  4. Confirm

Whitelisting an IP โ€‹

Whitelisted IPs bypass all firewall rules โ€” use for your office IP, monitoring services, or trusted upstream servers:

  1. Go to Firewall โ†’ White List โ†’ Add
  2. Enter the IP or CIDR
  3. Add a comment
  4. Click Add IP
โš 
Be selective with whitelist entries
A whitelisted IP bypasses Imunify360 entirely โ€” including malware scanning and brute-force protection. Only whitelist IPs you fully trust. Your own office IP is a good candidate; a client's IP usually isn't.

From the command line โ€‹

bash
# Block an IP
imunify360-agent blacklist ip add 1.2.3.4

# Whitelist an IP
imunify360-agent whitelist ip add 1.2.3.4

# Remove from blacklist
imunify360-agent blacklist ip delete 1.2.3.4

# List all blacklisted IPs
imunify360-agent blacklist ip list

Configuring automatic blocking thresholds โ€‹

Imunify360 blocks IPs automatically after detecting attack patterns. Adjust sensitivity under Imunify360 โ†’ Settings โ†’ Malware โ†’ DoS Protection:

SettingDefaultWhat it controls
Max connections per IP150Connections before IP is graylisted
Brute-force threshold5 failuresLogin failures before block
Block period600 secondsHow long IPs stay in gray list

Lowering thresholds catches attacks faster but increases false positives. The defaults work well for most servers.

Port-level rules โ€‹

For custom port blocking or allowing beyond what Imunify360 manages, use CSF (ConfigServer Firewall) which runs alongside Imunify360:

bash
# Allow a port for all IPs
csf -a IP tcp PORT      # allow specific IP on port
iptables -I INPUT -p tcp --dport PORT -j ACCEPT && csf -r

# Block a specific port
iptables -I INPUT -p tcp --dport PORT -j DROP && csf -r

Or from WHM: ConfigServer Security & Firewall โ†’ Firewall Configuration โ†’ edit TCP_IN and TCP_OUT port lists.

Managed hosting that actually manages.