RBA Cash Rate: 4.35% · 1AUD = 0.67 USD · Inflation: 4.1%  
Leading Digital Marketing Experts | 1300 235 433 | Aggregation Enquires Welcome | Book Appointment
Example Interest Rates: Home Loan Variable: 5.38% (6.14%*) • Home Loan Fixed: 5.39% (6.67%*) • Fixed: 5.39% (6.67%*) • Variable: 5.38% (6.14%*) • Investment IO: 5.69% (6.52%*) • Investment PI: 5.49% (5.98%*)

How to Whitelist an IP Address in Order to Access Your Website

In January of 2025 we introduced new strict security protocols to further protect your website resources and data. This update now requires that any IP used to access various resource must be whitelisted before those resources are accessed. If a resource (such as a website login) is accessed before the IP is whitelisted, your IP address will be banned. Once an IP is banned, it may only be whitelisted by us (this is so we can determine why the IP was initially whitelisted, and it prevents users whitelisting malicious addresses).

Abuse API: The Abuse system is part of the Malware module, and the latter may be reviewed in a blog article titled "How to Use the Abuse and Malware API", while information on the Abuse module may be references in an article title "We’ve Update the Malware API to Identify Real-Time Abuse".

Website Access: An article titled "Enable and Disable Website Access in Yabber" details how to temporarily unlock your website for the purposes of a login. We may or may not include the 'IP Whitelist' functionality as part of that system, so opening up your website will also whitelist your IP. That information will be shown in Yabber if and when it is introduced.

While security might appear extreme, the methods were introduced to protect the integrity of your data and systems. The banning of IP addresses is aggressive and unforgiving.

  Locating the Whitelist Security Panel

To locate the Whitelist panel, navigate to the 'Website' module, then select the small padlock icon to the right of the submenu. Select it and the applicable panels will be returned. THe entry panel returns the small form to unlock your website for editing.

Whitelist IP Navigation

  Pictured: To locate the Whitelist panel, navigate to the 'Website' module, then select the small padlock icon to the right of the submenu. Select it and the applicable panels will be returned. THe entry panel returns the small form to unlock your website for editing.

We'll look at how to whitelist an IP address of host.

  How to Whitelist an IP Address or Host

Select the IP Address panel. An option is returned to enter an IP address and provide a reason for the whitelist. Your current IP address is shown in the text field by default. Enter the applicable details and 'Save'.

Whitelist IP Address

  Pictured: Select the IP Address panel. An option is returned to enter an IP address and provide a reason for the whitelist. Your current IP address is shown in the text field by default. Enter the applicable details and 'Save'.

To whitelist an entire host, such as Google.com, that resolves a number of IP addresses, enter it via the 'Hosts' panel. Enter the Host and description, and 'Save'.

Whitelist Host

  Pictured: To whitelist an entire host, such as Google.com, that resolves a number of IP addresses, enter it via the 'Hosts' panel. Enter the Host and description, and 'Save'.

Entering a host data carries a small delay before it is applied to the process that manages inbound traffic, so it may take a while before any host is whitelisted.

  Considerations

It is important you whitelist an IP address before using it for administrative purposes. If you make an attempt to log into your website via an unrecognised address you will be blocked.

The Abuse system system is undergoing constant updates, so please advise if you identify any errors.

■ ■ ■

  Related Settings FAQs

Related FAQs and features.

In January of 2025 we introduced new strict security protocols to further protect your website resources and data. This update now requires that any IP used to access various resource must be whitelisted before those resources are accessed. If a resource (such as a website login) is accessed before the IP is whitelisted, your IP… [ Learn More ]

Part of our website and Yabber architecture requires that we create a Microsoft 365 (Azure) application on your behalf. This application is owned by you, and the applicable keys from that application are stored in Yabber which enables considerable integration between your website and other marketing (such as email marketing). We generally request only… [ Learn More ]

A webhook is a notification sent from Yabber to a defined location on the basis of another action taking place. For example, you might have a new lead arrive in Yabber, or a user might complete a fact find, and you will want that information sent to another system. The webhooks module is an extremely… [ Learn More ]

Yabber has multiple ways in which to notify broker of new leads, such as email, SMS, CRM, Planner, webhooks, but the easiest way of building a simple notification system is via an RSS feed. RSS stands for 'Really Simple Syndication', and it works by ingesting multiple RSS 'feeds' into a single aggregated source. Typically used… [ Learn More ]

When a user submits any kind of form in Yabber they will be registered to the applicable system, and in almost all cases they'll be filtered through to a primary Leads Table. The Leads Table is the primary record of all of those users that submit any kind of interest on your website or elsewhere,… [ Learn More ]

Almost without question, BeNet is the single most sophisticated AI made available in the finance industry. For all intents and purposes, it has to be considered to be an extremely knowledgeable mortgage broker with an expert understanding of digital marketing, processes, systems, policies, property, finance, best practice, and your marketing efforts. BeNet is connected to… [ Learn More ]

All rate data returned via Yabber will automatically segregate the requested 'standard' products from those 'conditional' products, such as green finance or leveraged residential lending against a business product. In all cases where we've had feedback from users and the validity of rates was questioned, the product has existed and was entirely valid, but the… [ Learn More ]

Before email and calendar tools may be used, we generally have to define our default email and calendar for various facilities. This action is normally completed by us during the setup, but if you're doing it yourself, or you are required to alter values, this FAQ will guide you through the process. It will only… [ Learn More ]

A company profile should be created in Yabber, and this is one of the first onboarding tasks. The details supplied here are those that are used by default throughout Yabber, including the White-Label e-book module that'll brand marketing booklets with your company details. Find the 'Profile' options by navigating to the Settings module. Select… [ Learn More ]

Yabber requires a number of images in order to perform certain tasks, such as white-labelling marketing material, created Fact Find report consumer guides, creating SEO markup, and so on. The following images are required: Company Logo. 500px x 500px Black and White Company Logo. 500px x 500px Wide Company Logo. 600px x 100px SEO Logo.… [ Learn More ]

  Related Security Website Articles

Related website articles.

In May of 2024 we introduced our , and we briefly introduced how we'd use the facility to mitigate the onslaught of illicit web traffic looking for server and plugin vulnerabilities that might potentially be exploited. While the service has made a significant impact on blocking malicious traffic, it was far from perfect, and an… [ Learn More ]

Some time back we had a website with an 'unauthorised' plugin introduce sophisticated Malware into a website that resulted in damage that made its way into other system files. As a result of that breach we introduced additional measures to mitigate the impact of potential intrusions - a necessity given the sensitive nature of any… [ Learn More ]

Having the necessity to protect client data by way of avoiding offshore loan processing centres, in this quick article we'll talk about the need to apply adequate security to your existing IT infrastructure to avoid penetration by offshore actors with a malicious intent. A mortgage company I founded back in 2005 and left permanently a… [ Learn More ]

Fraud in the mortgage industry is rampant. I'm not talking about those mortgage brokers that engage in illicit conduct by way of fraudulent transactions, or that very small number that intentionally neglects best consumer outcomes in favour of their own financial gain; I'm referring to the higher-end fraud that results in the emptying of customer… [ Learn More ]

There's rarely a day that passes that I don't get phone calls from an East-Indian or other offshore call center purporting to represent a legitimate Australian business. As a provider of and directly to brokers, we inherit the same responsibilities that are expected of financial providers. As such, we'll now be recording these scam conversations… [ Learn More ]

Over the last two weeks I've been on the receiving end of a relentless campaign by Design Sharks (Australia) - a company that provides logo, video, and web services. Every time I unsubscribed to one of their emails it seemingly has no effect (and I'm subscribed with multiple email addresses) so I decided to do… [ Learn More ]

TimThumb was a simple, flexible, PHP script that resized images and optionally applied various filters and effects. Just about everybody that developed for WordPress used it at one time or another because of its reliability, simplicity, and ease at which it fetched remote images. TimThumb bypassed WP's expensive image functions and (arguably) got the job… [ Learn More ]

In early July of this year we made the decision to enroll my oldest daughter into an early education program designed to "... enable your baby, toddler, and pre-school aged child to explore, develop, practice and refine skills essential for healthy neurological development." In the process of enrollment I discovered a breach in the company… [ Learn More ]

  Related FAQs

Share this FAQ

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

■ ■ ■

 
Download our complimentary 650-page guide on marketing for mortgage brokers. We'll show you exactly how we generate billions in volume for our clients.
Finance Guide, Cropped Top and Bottom
  Timezone: 1 · [ CHANGE ]