<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Three new allow lists were added to the ThreatSTOP Policy Builder. The following allow lists can be found under the “Allow” tab in the “Inbound Attacks (Servers)” category:</p> <!--more--><ul> <li><strong>nodeping.com Monitoring Service IPs</strong></li> </ul> <p>IP addresses for Nodeping website/server monitoring service. If you are a subscriber of Nodeping than these IPs should be allowed, otherwise, if you are not a subscriber - these can be used by malicious individuals to track your online status. The addresses in this feed were provided by Nodeping.com.</p> <ul> <li><strong>statuscake.com Website Monitoring Service, IPs</strong></li> </ul> <p>IP addresses for statuscake website/server monitoring service. If you are a subscriber of statuscake than these IPs should be allowed, otherwise, if you are not a subscriber - these can be used by malicious individuals to track your online status. The addresses in this feed were provided by statuscake.com.</p> <ul> <li><strong>&nbsp;</strong><strong>uptimerobot.com Website Monitoring Service</strong></li> </ul> <p>IP addresses for uptimerobot website/server monitoring service. If you are a subscriber of uptimerobot than these IPs should be allowed, otherwise, if you are not a subscriber - these can be used by malicious individuals to track your online status. The addresses in this feed were provided by uptimerobot.com.</p> <p>These targets are also available in the “Block” tabs to add to a policy. For users who don’t subscribe to nodeping, statuscake, or uptimerobot, blocking these IPs may make sense as these IPs might be abused and used to scan networks for vulnerabilities prior to an outright attack.</p> <p>&nbsp;</p> <p>&nbsp;</p></span>