Firewall Rules & IP Blocking โ
Imunify360 manages the server firewall automatically, but you can manually control the black list, gray list, and white list, and configure when automatic blocking triggers.
Accessing the firewall โ
WHM โ Plugins โ Imunify360 โ Firewall.
Manual IP management โ
Blocking an IP (black list) โ
Use this when you know an IP is malicious and want to block it permanently:
- Go to Firewall โ Black List โ Add
- Enter the IP address or CIDR range (e.g.
192.168.1.0/24to block a /24 subnet) - Add a comment so you remember why it was blocked
- Click Add IP
The IP is blocked immediately across all ports.
Unblocking an IP โ
- Go to Firewall โ Black List
- Use the search box to find the IP
- Click Delete next to it
- Confirm
Whitelisting an IP โ
Whitelisted IPs bypass all firewall rules โ use for your office IP, monitoring services, or trusted upstream servers:
- Go to Firewall โ White List โ Add
- Enter the IP or CIDR
- Add a comment
- Click Add IP
From the command line โ
# Block an IP
imunify360-agent blacklist ip add 1.2.3.4
# Whitelist an IP
imunify360-agent whitelist ip add 1.2.3.4
# Remove from blacklist
imunify360-agent blacklist ip delete 1.2.3.4
# List all blacklisted IPs
imunify360-agent blacklist ip listConfiguring automatic blocking thresholds โ
Imunify360 blocks IPs automatically after detecting attack patterns. Adjust sensitivity under Imunify360 โ Settings โ Malware โ DoS Protection:
| Setting | Default | What it controls |
|---|---|---|
| Max connections per IP | 150 | Connections before IP is graylisted |
| Brute-force threshold | 5 failures | Login failures before block |
| Block period | 600 seconds | How long IPs stay in gray list |
Lowering thresholds catches attacks faster but increases false positives. The defaults work well for most servers.
Port-level rules โ
For custom port blocking or allowing beyond what Imunify360 manages, use CSF (ConfigServer Firewall) which runs alongside Imunify360:
# Allow a port for all IPs
csf -a IP tcp PORT # allow specific IP on port
iptables -I INPUT -p tcp --dport PORT -j ACCEPT && csf -r
# Block a specific port
iptables -I INPUT -p tcp --dport PORT -j DROP && csf -rOr from WHM: ConfigServer Security & Firewall โ Firewall Configuration โ edit TCP_IN and TCP_OUT port lists.

