Konrado.AIdocs
IntegrationsNetwork

IP Restriction

Whitelist Konrado.AI's static IP addresses for secure server communication

If your infrastructure uses IP-based access controls, such as firewalls, security groups, or application-level whitelists, allow Konrado.AI's dedicated static IP addresses.

Static IP Addresses

All outbound requests from Konrado.AI originate from these static addresses:

46.225.233.157/32
2a01:4f8:1c19:f331::/64

When to Whitelist

Add these addresses to your allowlist when your environment restricts inbound access for:

  • Firewall rules: server or network firewalls that restrict inbound connections by source IP
  • Hosting panel ACLs: cPanel, DirectAdmin, or Plesk configurations that limit API access to trusted IPs
  • Cloud security groups: AWS Security Groups, Azure NSGs, or GCP firewall rules scoped to source addresses
  • Web Application Firewalls: WAF policies that block requests from unrecognized sources
  • API gateways: rate limiting or access policies bound to known IP addresses

Configuration Examples

Linux Firewall (iptables)

iptables -A INPUT -s 46.225.233.157 -j ACCEPT
ip6tables -A INPUT -s 2a01:4f8:1c19:f331::/64 -j ACCEPT

UFW (Ubuntu)

ufw allow from 46.225.233.157
ufw allow from 2a01:4f8:1c19:f331::/64

Cloud Security Groups

Add inbound rules allowing traffic from 46.225.233.157/32 and 2a01:4f8:1c19:f331::/64 on the required port for your integration.

If your organization requires advance notice of IP changes, contact support to be added to the notification list.

On this page