IniLerm
Forum Replies Created
-
Forum: Plugins
In reply to: [Advanced IP Blocker] Google site kit failed to connect – retry?Hi @cousineddie,
Thanks for reaching out! That is unusual, as we test extensively with Site Kit, but valid requests can sometimes be flagged depending on strictness levels and server variables.
If disabling the plugin fixes the connection instantly, it confirms that one of our security modules (likely the WAF, Bot Protection, or REST API hardening) is blocking the background requests Site Kit makes to Google.
The Solution (Safe & Quick): Instead of disabling security checks globally, the best practice is to create a specific “Allow” rule for Site Kit traffic. This keeps your site secure while letting Google do its job.
Go to Security > Blocking Rules > Advanced Rules.
Click Add New Rule.
Configure it as follows:
Name: Allow Site Kit
Condition 1: Request URI CONTAINS google-site-kit
Condition 2: ASN EQUALS AS15169 (This is Google’s unique network identifier)
Action: Allow (Bypass Security)
Click Save Rule.
This tells the firewall: “If a request comes from Google’s network AND is specifically for Site Kit, let it pass.”Diagnosis (Optional): If you want to know exactly what triggered the block:
Re-enable Advanced IP Blocker.
Trigger the Site Kit error again.
Go to Security > Logs & Sessions > Security Log.
Look for a “Blocked” entry at that exact time. The “Reason” column (e.g., WAF: SQL Injection, Fake Crawler, Protocol Violation) will reveal exactly why the plugin stopped the request.
Let us know if the Advanced Rule solves it for you!Best regards,
Advanced IP Blocker Team
Forum: Plugins
In reply to: [Advanced IP Blocker] Wanting to whitelist UpTimeDoctor botHi @thewatchman3,
I have just performed a technical analysis of UptimeDoctor specifically, and I have some important findings for you.
The Problem with UptimeDoctor:
Unlike other monitoring services (like UptimeRobot or StatusCake), UptimeDoctor does not seem to provide a public list of IPs for whitelisting, and they use generic User-Agents that mimic regular browsers or even attackers.
In fact, our AIB Community Network has already flagged many of their IPs as “malicious” because their aggressive checking behavior looks exactly like a brute-force or scraper attack to most firewalls.Why you see 403 Forbidden:
Since they behave aggressively, they are likely being blocked at the Server Level (Htaccess) or by the Cloudflare/Community Blocklist automatically.Recommendation:
Since we cannot safely whitelist them without a specific User-Agent or IP list (opening the door to them would open the door to real attackers using the same generic methods), I recommend contacting their support and asking:- “Do you have a fixed list of IPs I can whitelist?”
- “Do you use a specific User-Agent I can trust?”
If they cannot provide this, I strongly suggest switching to a more “firewall-friendly” service like UptimeRobot (which provides a clean text file of IPs that you can import with our new Bulk feature).
Best regards,
Advanced Ip Blocker Team
Forum: Plugins
In reply to: [Advanced IP Blocker] Wanting to whitelist UpTimeDoctor botSorry, perhaps the last answer wasn’t correct and they are two different services.
You need to verify the service you want to whitelist and identify the firewall rules on its official website.
Once identified, add the correct rules: User Agent, IPs, ASNS, etc. Apologies for the confusing answer.Forum: Plugins
In reply to: [Advanced IP Blocker] Wanting to whitelist UpTimeDoctor botUntil the new version 8.8.3 is released, reading recommendations:
example UpTimeDoctor.com monitoring service:
Official documentation (recommended reading):
Recommended formats for importing (One IP per line)
IPv4 (.txt)
IPv4 and IPv6 combined (.txt)- This reply was modified 17 hours, 16 minutes ago by IniLerm.
Forum: Plugins
In reply to: [Advanced IP Blocker] Wanting to whitelist UpTimeDoctor botHi @thewatchman3,
Good catch on the monitoring service. These services often trigger security rules because they behave like bots (frequent checks, automated requests).
Regarding the User-Agent:
If adding “UptimeDoctor” to the UA whitelist didn’t work, it’s likely they use a generic User-Agent (like Chrome/Mozilla) or a variation you haven’t guessed. The most reliable method is always IP Whitelisting.Great News (New Feature):
We are releasing version 8.8.3 within the next few hours specifically to solve this problem!We have added a new “Bulk Import / Export” feature directly in the Whitelist tab.
How to fix it (Once updated):
- Find the official list of IPs from your provider (e.g., UptimeRobot publishes a .txt file, UpTimeDoctor should have a help page with theirs).
- Go to Security > IP Management > Whitelist.
- Click the new “Bulk Import” button.
- Paste the full list of IPs (one per line).
- Add a note (e.g., “UptimeRobot Europe”) and click Import.
This will instantly whitelist their entire infrastructure without you having to add them one by one.
Pro Tip: If they offer IPs by region, try adding only the regions you use to keep your whitelist clean.
Let me know if this helps once the update is live!
Best regards,
Advanced IP Bolcked Team
Forum: Plugins
In reply to: [Advanced IP Blocker] whitelisted but still blockedHi @tedraortega,
I am sorry to hear you are still locked out. Since you are seeing a generic “403 access restricted” message (and not our plugin’s custom HTML message), this strongly suggests the block is happening at the Server Level (via .htaccess or ModSecurity), not within the WordPress plugin code itself.
If you have access to the plugin, try this:
- Go to Security > IP Management > Blocked IPs.
- Select “Unblock ALL IPs” from the bulk actions dropdown. This flushes the database and attempts to clear Cloudflare/Htaccess rules.
- Go to Security > Settings > Login & User Protection and ensure “Whitelist Login Access” is UNCHECKED. (This setting is the #1 cause of self-lockouts on dynamic IPs).
- Add your current IP to the Whitelist in Dashboard > System Status.
If you still see “denied by modsecurity”, that is a hosting-level firewall completely separate from WordPress. You would need to contact your hosting provider to whitelist your IP in their system.
Let us know if this gets you back in!
Forum: Plugins
In reply to: [Advanced IP Blocker] How do I add 200 IPs to the whitelist?Hi @theboina,
That is a brilliant workaround! Using the Import/Export feature to inject a custom JSON list is a very creative and valid solution. I am impressed.
You are absolutely right about ASNs—not every provider has a clean one, so having a way to bulk import IPs is essential. We will still work on a dedicated UI for bulk pasting to make it easier for everyone, but your method is perfect for power users in the meantime.
Thanks for sharing this tip! It might help others reading this thread.
Best regards,
IniLerm
Forum: Reviews
In reply to: [Advanced IP Blocker] Good integration with the webHi @theboina,
Thank you so much for the 5-star review!
I am really glad to hear that you found the plugin both comprehensive and easy to customize for your specific needs. Ensuring seamless integration with other tools (like the ones we discussed) is a top priority for us, so your feedback confirms we are hitting the mark.
Thanks for your support!
Forum: Plugins
In reply to: [Advanced IP Blocker] whitelisted but still blockedHi @tedraortega,
This is excellent detective work. The fact that “Pausing Cloudflare” fixes it confirms 100% that it is an IP Detection issue.
Even though the System Status says “Green”, the plugin is likely failing to extract your real IP address from the Cloudflare headers in your specific server environment, so it sees Cloudflare’s IP as “Your IP”.
The Test:
- Enable Cloudflare again.
- Log in (since you said you stay logged in).
- Go to Security > Dashboard > System Status.
- Look at “Your Detected IP Address”.
- Does it show your real home IP (check whatsmyip.com)?
- Or does it show a Cloudflare IP (usually starts with 162., 172., 104.)?
The Solution:
If it shows a Cloudflare IP, it means the “Trusted Proxy” setting (AS13335) isn’t enough for your server configuration.
Please try adding the Cloudflare IP Ranges explicitly to the “Trusted Proxies” list (Settings > IP Detection). Sometimes servers don’t resolve the ASN correctly.You can find the list here: https://www.cloudflare.com/ips/ (Copy/paste the IPv4 list into the Trusted Proxies box).
Also, please double-check that “Whitelist Login Access” is definitely UNCHECKED. That setting is incompatible with dynamic setups like this.
Forum: Plugins
In reply to: [Advanced IP Blocker] How do I add 200 IPs to the whitelist?Bonus Method (For Advanced Users with SSH/WP-CLI):
If you have SSH access and WP-CLI installed, you can import thousands of IPs in seconds using a simple one-liner.
Since you mentioned ManageWP, here is the exact command to fetch their official IP list and whitelist them all automatically:
You must run the command in the WordPress directory.
curl -s https://s42013.pcdn.co/wp-content/uploads/2021/03/managewp-ips.txt | xargs -I {} wp advaipbl whitelist add {} --detail="ManageWP"(Note: This works because our plugin has full WP-CLI support. The input file must have one IP per line).
Forum: Plugins
In reply to: [Advanced IP Blocker] How do I add 200 IPs to the whitelist?Hi @theboina,
That is a great question. Adding 200 IPs manually is definitely not efficient!
We are planning to add a “Bulk Import” feature (CSV/Text area) in a future version (v8.9+), but right now, you have two much faster and smarter ways to handle this:
1. Use ASN Whitelisting (Recommended)
Instead of whitelisting 200 individual IPs, you can often whitelist the entire network provider of the service.- Go to Security > Blocking Rules > ASN Blocking.
- In the “ASN Whitelist” box, add the ASN of the service.
- Example: If StatusCake uses a specific ASN (you can check one of their IPs on bgp.he.net), adding that single line allows all their current and future IPs instantly.
2. Use CIDR Ranges
Services like ManageWP often publish their IPs in “CIDR format” (e.g., 192.168.0.0/24).- Our “Add to Whitelist” input supports CIDR ranges.
- Instead of adding 256 individual IPs, you just add 192.168.0.0/24 once, and it covers the whole block.
Pro Tip: Check the support documentation of StatusCake/ManageWP. They usually provide a list of CIDR ranges or their ASN to make firewall configuration easier.
We will work on the bulk paste feature for the next release to make this even easier!
Best regards,
Advanced Ip Blocker Team
Forum: Plugins
In reply to: [Advanced IP Blocker] whitelisted but still blockedHi @tedraortega,
Thank you for the update. Since disabling that setting didn’t fix it, we need to dig a little deeper to find out exactly who is blocking you and why.
I noticed your site is behind Cloudflare. This is the most likely cause of the issue.
The Diagnosis:
If you haven’t configured the plugin to “trust” Cloudflare, the plugin sees Cloudflare’s IP address instead of your real home IP. So even if you whitelist your home IP, the plugin thinks you are someone else and blocks you.Action Plan (Please try this in order):
- Configure IP Detection (Crucial for Cloudflare users):
- Go to Security > Settings > IP Detection.
- In the “Trusted Proxies” box, add this line (the Cloudflare identifier):
AS13335 - Click Save.
- Check: Go to Dashboard > System Status. Does “Connection via Proxy” now show a green “Cloudflare”? If yes, the problem should be solved.
- Tell us what you see:
If you still get blocked, what exactly happens?- Do you see a white screen with “Access Denied”?
- Do you see a Cloudflare “Attention Required” page?
- Does the login page just reload?
Knowing the exact error message will help us pinpoint if the block is coming from our plugin or from a Cloudflare rule.
Best regards,
Advanced IP Blocker Team
Forum: Plugins
In reply to: [Advanced IP Blocker] SSL “critical” with automatic DeepScanIf you have a moment, we would really appreciate a 5-star review to help other users find the plugin.
Thanks again, and enjoy using your site securely!
Forum: Plugins
In reply to: [Advanced IP Blocker] SSL “critical” with automatic DeepScanHi @wassi007,
Just checking in—did the new settings in v8.8.2 solve the email alert issue for you? If so, please mark this ticket as Resolved. Thanks!
Forum: Plugins
In reply to: [Advanced IP Blocker] SSL “critical” with automatic DeepScanHi @wassi007,
Great news! We have just released version 8.8.2 with the feature you requested.
You now have granular control over the Site Scanner.
How to solve your SSL alert issue:
- Update to v8.8.2.
- Go to Security > Settings > Notifications.
- Scroll down to the new “Site Scanner Settings” section.
- Uncheck “Check SSL Certificate”.
- Save changes.
The Result:
- The SSL check will now show as “Skipped” in manual scans (Grey status).
- It will be completely ignored during automated background scans.
- Since the “Critical” error is gone, you will stop receiving the daily alert emails (unless a new, real issue is found).
Note on your Plesk environment:
Since you are the only user reporting this persistent false positive, it strongly suggests a specific configuration in your Plesk loopback interface where WordPress cannot verify its own SSL certificate internally. By disabling this specific check, you align the plugin with your server’s reality without losing the other security benefits.I hope this provides the perfect balance for your 30+ sites!
Best regards,
Advanced IP Blocker Team