{"id":2647,"date":"2024-11-12T08:51:20","date_gmt":"2024-11-12T08:51:20","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=2647"},"modified":"2024-11-12T08:51:24","modified_gmt":"2024-11-12T08:51:24","slug":"how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/","title":{"rendered":"How to whitelist an IP address in cPHulk Brute Force Protection?"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction:<\/h3>\n\n\n\n<p>cPHulk Brute Force Protection in WHM (Web Host Manager) protects your server from brute-force attacks by blocking IP addresses that attempt to log in repeatedly with incorrect credentials. However, there are times when you may want to ensure certain trusted IP addresses, like those used by administrators, are not blocked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Procedure:<\/h3>\n\n\n\n<p><strong>Step 1:<\/strong><\/p>\n\n\n\n<p>Log into WHM as the &#8216;root&#8217; user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"765\" height=\"464\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png\" alt=\"\" class=\"wp-image-2649\" style=\"width:363px;height:auto\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png 765w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-300x182.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-150x91.png 150w\" sizes=\"auto, (max-width: 765px) 100vw, 765px\" \/><\/figure>\n\n\n\n<p><strong>Step 2:<\/strong><\/p>\n\n\n\n<p>Navigate to &#8220;Home \u00bb Security Center \u00bb&nbsp;cPHulk Brute Force Protection.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"308\" height=\"905\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-1.png\" alt=\"\" class=\"wp-image-2650\" style=\"width:119px;height:auto\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-1.png 308w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-1-102x300.png 102w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-1-51x150.png 51w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-1-300x881.png 300w\" sizes=\"auto, (max-width: 308px) 100vw, 308px\" \/><\/figure>\n\n\n\n<p><strong>Step 3:<\/strong><\/p>\n\n\n\n<p>Open the &#8220;Whitelist Management&#8221; tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"531\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2-1024x531.png\" alt=\"\" class=\"wp-image-2651\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2-1024x531.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2-300x155.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2-768x398.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2-150x78.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-2.png 1447w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 4: <\/strong><\/p>\n\n\n\n<p>Enter the IP address or IP address range to be whitelisted in the &#8220;<em>New Whitelist Records<\/em>&#8221; textbox.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"486\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9-1024x486.png\" alt=\"\" class=\"wp-image-2672\" style=\"width:436px;height:auto\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9-1024x486.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9-300x142.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9-768x365.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9-150x71.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-9.png 1382w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 5:<\/strong><\/p>\n\n\n\n<p>Click the &#8220;<em>Add<\/em>&#8221; button.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-1024x489.png\" alt=\"\" class=\"wp-image-2671\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-1024x489.png 1024w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-300x143.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-768x367.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-1536x733.png 1536w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8-150x72.png 150w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image-8.png 1596w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion:<\/h3>\n\n\n\n<p>Whitelisting an IP address in cPHulk Brute Force Protection is a quick and effective way to ensure that trusted IPs, like those of server administrators, maintain uninterrupted access to the server<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: cPHulk Brute Force Protection in WHM (Web Host Manager) protects your server from brute-force attacks by blocking IP addresses that attempt to log in repeatedly with incorrect credentials. However, there are times when you may want to ensure certain trusted IP addresses, like those used by administrators, are not blocked. Procedure: Step 1: Log ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2647","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction: cPHulk Brute Force Protection in WHM (Web Host Manager) protects your server from brute-force attacks by blocking IP addresses that attempt to log in repeatedly with incorrect credentials. However, there are times when you may want to ensure certain trusted IP addresses, like those used by administrators, are not blocked. Procedure: Step 1: Log ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T08:51:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T08:51:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"765\" \/>\n\t<meta property=\"og:image:height\" content=\"464\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Saikrishna Areddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Saikrishna Areddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/\"},\"author\":{\"name\":\"Saikrishna Areddy\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/8a5f4b5a8e71659e5a3bbee27663d9ba\"},\"headline\":\"How to whitelist an IP address in cPHulk Brute Force Protection?\",\"datePublished\":\"2024-11-12T08:51:20+00:00\",\"dateModified\":\"2024-11-12T08:51:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/\"},\"wordCount\":143,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/image.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/\",\"name\":\"How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/image.png\",\"datePublished\":\"2024-11-12T08:51:20+00:00\",\"dateModified\":\"2024-11-12T08:51:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/8a5f4b5a8e71659e5a3bbee27663d9ba\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/image.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/image.png\",\"width\":765,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2024\\\/11\\\/12\\\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to whitelist an IP address in cPHulk Brute Force Protection?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/8a5f4b5a8e71659e5a3bbee27663d9ba\",\"name\":\"Saikrishna Areddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g\",\"caption\":\"Saikrishna Areddy\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/saikrishna\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/","og_locale":"en_US","og_type":"article","og_title":"How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base","og_description":"Introduction: cPHulk Brute Force Protection in WHM (Web Host Manager) protects your server from brute-force attacks by blocking IP addresses that attempt to log in repeatedly with incorrect credentials. However, there are times when you may want to ensure certain trusted IP addresses, like those used by administrators, are not blocked. Procedure: Step 1: Log ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2024-11-12T08:51:20+00:00","article_modified_time":"2024-11-12T08:51:24+00:00","og_image":[{"width":765,"height":464,"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png","type":"image\/png"}],"author":"Saikrishna Areddy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Saikrishna Areddy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/"},"author":{"name":"Saikrishna Areddy","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/8a5f4b5a8e71659e5a3bbee27663d9ba"},"headline":"How to whitelist an IP address in cPHulk Brute Force Protection?","datePublished":"2024-11-12T08:51:20+00:00","dateModified":"2024-11-12T08:51:24+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/"},"wordCount":143,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/","name":"How to whitelist an IP address in cPHulk Brute Force Protection? - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png","datePublished":"2024-11-12T08:51:20+00:00","dateModified":"2024-11-12T08:51:24+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/8a5f4b5a8e71659e5a3bbee27663d9ba"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2024\/11\/image.png","width":765,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2024\/11\/12\/how-to-whitelist-an-ip-address-in-cphulk-brute-force-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to whitelist an IP address in cPHulk Brute Force Protection?"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/8a5f4b5a8e71659e5a3bbee27663d9ba","name":"Saikrishna Areddy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&d=mm&r=g","caption":"Saikrishna Areddy"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/saikrishna\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=2647"}],"version-history":[{"count":3,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2647\/revisions"}],"predecessor-version":[{"id":2673,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/2647\/revisions\/2673"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=2647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=2647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=2647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}