CloudFlare blocks IP addresses known or perceived to be sources of malware or spam. The CloudFlare Firewall also detects web activity that it considers to be harmful to your site and blocks IP addresses linked to such activity.
Very often, webhooks without a referrer originating from the site itself can be considered illicit and result in the posting IP addresses being blocked. ActiveCampaign webhooks fall under the HTTP POST rules. Another “gotcha” are unknown or missing user agents where CloudFlare expects to see the name of the most common web browsers.
CloudFlare provides a mean to establish a so-called “Trust List”, enabling webhooks originating from ActiveCampaign to be “whitelisted”, enabling them to reach your site and be processed by ActiveMember360. In addition, CloudFlare lets one define so-called “Page Rules” which would allow ActiveCampaign webhooks to get past the security scans.
To add ActiveCampaign IP addresses to the CloudFlare “Trust List”:
(1) Go to your CloudFlare Firewall settings and click on the “Trust/Block IP List” tab.
(2) In the input field next to the green “Trust” submit button, enter the following IP addresses
18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11,
18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11,
18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11,
and press the “Trust” button (Please note that this list is often changed / updated).
Next, go to your “CloudFlare Page Rules” settings. There, you will create a new rule for your site:
- Dynamic Pattern -> http://yoursite.com?mbr=*
- Additional settings:
- Always Online -> Off
- Browser Integrity Check (BIC) -> Off
- Browser Cache TTL -> 300
- Custom Caching -> Bypass Caching
- Forwarding -> Off
- Performance -> Off
- Security Level -> Lowest
- SSL -> Off