Polaris IP Addresses

Polaris IP Addresses

Once configured under Polaris, some webpages may have an error page (Error 504) when attempting access. In order to resolve this issue, the you must add the following IP addresses to your domain Origin Server's whitelists.

Note: These are separate whitelisting functions from the Polaris WAAP whitelisting in Access Control.



IPv4 List:
1.32.240.2
1.32.240.3
1.32.240.4
1.32.242.2
1.32.242.3
1.32.242.4
1.32.244.2
1.32.244.3
1.32.244.4
1.32.241.2
1.32.241.3
1.32.241.4
1.32.233.2
1.32.233.3
1.32.233.4
1.32.238.2
1.32.238.3
1.32.238.4
13.251.210.79
3.1.158.204
202.168.108.0/24
3.1.246.229
14.128.61.1
202.162.108.3
202.162.108.4
18.142.251.243
3.1.158.204
202.162.108.2
14.128.61.1
    • Related Articles

    • Blacklisting an IP Address

      What is blacklisting? There are two ways of restricting access to your website, allowing all traffic except for certain specified IP addresses (Blacklisting) or only allowing specified IP addresses (Whitelisting). The Blacklist IP Address setting can ...
    • Whitelisting an IP Address

      What is whitelisting? There are two ways of restricting access to your website, allowing all traffic except for certain specified IP addresses (Blacklisting) or only allowing specified IP addresses (Whitelisting).  How do I whitelist a website? The ...
    • How does Polaris protect your website?

      What does Polaris do? Polaris provides DNS security and monitors traffic accessing your website for any malicious activities. This protects your websites from various types of attacks, including those on the OWASP Top 10 List as well as DDoS attacks. ...
    • Getting Started with Polaris - Registration

      Thank you for using Polaris to secure your website. This guide will go through the basics of setting up your website(s) on Polaris and how to navigate the interface. The guide will also help you understand the various settings and what they mean for ...
    • Attacks - what does Polaris detect and do?

      Polaris identifies a vast amount of threats that might occur against your site. While the contents in this article are not exhaustive, it covers the more widespread and common attack types that are likely to occur against your site as well as some of ...