FlyingFish
FlyingFish on GitHub
  • FlyingFish
    • About the project
    • Screenshots
    • Installation
      • Quick Setup
      • Quick Update
      • Create Backup
      • Long setup
        • Env
        • Docker compose
          • Ports
          • Network
      • Storage management
      • FAQ
    • Configurations
      • Which user type am I
      • Listen
        • Port forwarding
        • Proxy protocol
        • IP Access
        • Gateway identifiers
        • UPnP Nat
      • Domains
        • DynDns Clients
        • Own DNS Server
        • Discussions Subdomains
        • DynDns Server
      • Routes
    • Examples
      • SSH hidden on HTTPS
      • FlyingFish to other reverse proxy
      • Backup Server, SSH to Nas
      • Own DynDNS Server - Fritzbox
      • Inventree - Route
    • Developer
      • Ideas, requests and bugs
      • Project structure
        • Under the hood
        • Service structure
        • Schema
        • Object name rules
      • Image build
      • Plugins
    • Contribution
Powered by GitBook
On this page
  • Whitelist
  • Blacklist
  • Add IP to White-/Black-list
Edit on GitHub
  1. FlyingFish
  2. Configurations
  3. Listen

IP Access

the nginx has been extended with the nginx js module and can check all incoming connections with a white/black list.

PreviousProxy protocolNextGateway identifiers

Last updated 1 year ago

In my development phase, I noticed that I received many requests on my dynamic IP (from my ISP). After checking what kind of requests were, I wanted to stop them. Many of these requests are bots from giant companies scouring the web. But so many hackers who do not make valid requests but try to break into the server.

Whitelist

IP addresses from the whitelist are allowed to connect. All other addresses that are not noted will be blocked.

You can switch to the whitelist with a tab. In a list you see all IPs that are whitelisted. In the second column you can see when and how often a query was started from this IP.

Only IPs that are whitelisted can make a request. All other IPs are automatically blacklisted.

Blacklist

  1. Tab for Blacklist: There are more tabs under the blacklist.

  2. Tab for Own/Imports: Here you have two lists. Once the list of self-entered IPs that are blocked. Or the imported list.

  3. Entry of import blacklisting: Here you can see the information about what is known under the IP and when it last tried to access it. The list is sorted by the last accesses.

IP addresses that are in the blacklist will be blocked. What is special about the blacklist is that it is compared with a public blacklist every 24 hours.

Add IP to White-/Black-list

The dialog for the blacklist and whitelist are identical.

  1. IP: IP to block or allow through.

  2. Disable this ip block: Disables the rule if the rule should not be deleted.

  3. Description: A description can be given of what is known about the IP.

In what way is your cup full?
Whitelist
Blacklist imports
;)
Buttons for add Black/White-Rule.
Dialog