IP Access
IP access control is a key feature that enhances account security.
IP Access
IP access control is a key security feature that enhances account protection. Once enabled, only IP addresses or IP ranges that you explicitly add to the allowlist can call Aurora SendCloud's email sending API or send emails via the SMTP service. All requests from non-allowed IP addresses are automatically blocked, effectively preventing unauthorized access and resource abuse caused by API key leaks.
Configuring IP Allowlisting
To enable this feature:
-
Log in to the Aurora SendCloud console and navigate to the "IP Access Control" page under "Security Settings" or "Account Settings."
-
Switch the feature to "On."
Adding an IP Allowlist
-
Click the "Add IP" button in the IP Allowlist section.
-
In the input box, you can add IP addresses using the following formats (one entry per row):
Single IP: xxx.xxx.xxx.xxx (e.g., 220.181.12.241)
IP Range: xxx.xxx.xxx.xxx-xxx.xxx.xxx.xxx (e.g., 220.181.12.241-220.181.12.255)
IP Segment: xxx.xxx.xxx.xxx/N (e.g., 220.181.12.0/24)
Note: Internal IP addresses are not allowed, including:
- 192.168.0.0-192.168.255.255
- 172.16.0.0-172.31.255.255
- 10.0.0.0-10.255.255.255
- Click "Confirm" to save. You can add multiple IP entries at once.
Important Notes
Immediate Effect: Rules take effect immediately after they are added or modified. Before enabling this feature, ensure that all legitimate sending server IP addresses (including those used in production and test environments) have been added to the allowlist. Failure to do so may result in service interruption due to IP blocking.
Caution: To avoid locking yourself out, add all necessary IP addresses and confirm they are correct before turning on the main switch.
Request IP Logs and Blocking History
Aurora SendCloud records API request logs for the past 30 days to help you manage and troubleshoot issues.
On the "IP Access Control" page, you can find the "Request IP History" or "Blocking History" tabs, where you can view:
- Request IP Address: The source IP address that initiated API or SMTP requests
- Last Request Time: The timestamp when this IP last initiated a request
- Interception Count: The number of times this IP was blocked due to not being on the allowlist after IP control was enabled
Use Cases
Security Audit
By checking the request IP list, you can identify unknown or suspicious IP addresses attempting to call your API, which may indicate an API key leak.
Troubleshooting
If your sending service receives a "Request Rejected" error, verify that the sending server's IP address has been correctly added to the allowlist and identify issues based on the interception log.
Best Practices
Principle of Least Privilege
Only add the minimum number of IP addresses necessary for your business to the allowlist to minimize security risks
Regular Review
Regularly review the request IP history and interception log, and promptly remove unused IP addresses
Pre-configuration
Before enabling this feature, complete the allowlist configuration and testing to ensure business continuity
Updated about 10 hours ago
