1. Spider IP Whitelist
Allow traffic from search engine spiders, identified by IP addresses without Spider-specific characteristics.
We operate an automated spider IP collection system to promptly gather the latest spider IP addresses.
2. Malicious IP Blacklist
A featured function—please ensure it is enabled!
Automatically downloads a vast database of malicious IPs from the cloud and blocks all communication (both inbound and outbound) between these IPs and the local machine.
We maintain a global threat monitoring network that collects extensive lists of malicious IPs daily and synchronizes them with all defense system endpoints.
3. IP/Region Black and White List
Block or allow traffic from specific IP addresses or regions (applies to both inbound and outbound traffic).
4. Priority Order
The whitelist takes the highest precedence. The priority order is as follows:
Super Whitelist > Whitelist > Blacklist > Interceptionlist> Inbound/Outbound Rules > Attack Protection
