Whitelisting IP addresses means explicitly allowing traffic from those addresses to access your system, application, or service. Although the exact steps vary by platform (firewalls, cloud services, email systems, APIs, etc.), the overall process is typically the same.
1. Locate the IP Whitelist or Access Control Settings
Most systems store whitelist settings under sections such as:
- Security
- Firewall rules
- Network settings
- Access control
- Trusted IPs / Allowed IPs
Look for any option labeled:
- Whitelist
- Allowlist
- Allowed IP addresses
- Trusted sources
2. Gather Your List of IP Addresses
Here is the list of IP Addresses:
192.237.233.59
192.237.233.60
192.237.233.61
192.237.233.62
198.101.170.235
192.237.233.63
192.237.152.228
192.237.228.130
207.235.118.2
207.235.118.4
192.237.233.56
192.237.233.57
3. Add the IP Addresses to your Whitelist
Depending on the platform, you may add:
- One IP per line
- A comma‑separated list
- A range (e.g., 203.0.113.0/24)
– only if ranges/CIDR notation are supported
Often you’ll click something like:
- Add
- New rule
- Add IP
- + Allow IP
Then paste or enter each IP address.
4. Save or Apply the Changes
Most systems require you to:
- Click Save, Apply, or Update Policy
- Confirm changes, especially if the system warns you about security risk
Some platforms apply the whitelist immediately; others may take several minutes to propagate the changes.
5. Test Access
Once the IPs are whitelisted:
- Attempt to connect from one of the allowed IPs
- Confirm the service is accessible
- Review logs to make sure traffic is allowed and not blocked by another rule

