IntegrationsNetwork
IP Restriction
Whitelist Konrado.AI's static IP addresses for secure server communication
If your infrastructure uses IP-based access controls, such as firewalls, security groups, or application-level whitelists, allow Konrado.AI's dedicated static IP addresses.
Static IP Addresses
All outbound requests from Konrado.AI originate from these static addresses:
46.225.233.157/32
2a01:4f8:1c19:f331::/64When to Whitelist
Add these addresses to your allowlist when your environment restricts inbound access for:
- Firewall rules: server or network firewalls that restrict inbound connections by source IP
- Hosting panel ACLs: cPanel, DirectAdmin, or Plesk configurations that limit API access to trusted IPs
- Cloud security groups: AWS Security Groups, Azure NSGs, or GCP firewall rules scoped to source addresses
- Web Application Firewalls: WAF policies that block requests from unrecognized sources
- API gateways: rate limiting or access policies bound to known IP addresses
Configuration Examples
Linux Firewall (iptables)
iptables -A INPUT -s 46.225.233.157 -j ACCEPT
ip6tables -A INPUT -s 2a01:4f8:1c19:f331::/64 -j ACCEPTUFW (Ubuntu)
ufw allow from 46.225.233.157
ufw allow from 2a01:4f8:1c19:f331::/64Cloud Security Groups
Add inbound rules allowing traffic from 46.225.233.157/32 and 2a01:4f8:1c19:f331::/64 on the required port for your integration.
If your organization requires advance notice of IP changes, contact support to be added to the notification list.