Welcome to World of IPTV

With

+23k members
+11k threads
+106k posts

we are the most popular IPTV community on the web. 

IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
TO PREVENT THIS ISSUE THE DECISION WAS MADE THAT IN THE FUTURE A ANNUALLY FEE 20 EURO WILL BE RAISED FOR NEW MEMBERSHIPS.

Join now to the World of IPTV

Forum Rules

Before you start, check out the forum rules first

Account upgrade

Upgrade your account to get access to full features

Advertising

Would you like to place your advertisement with us ?

Resources Manager

Hundreds of IPTV scripts and apps are available for download

Question Tips for DDOS Protection With CoudFlare

tugapt

Extended Member
Ext. Member
Joined
Nov 8, 2019
Messages
18
Reaction score
7
Points
14
Location
lisboa
Hi,

We're considering protecting our XC-UI Server again DDOS using cloudflare, but we're afraid this will block normal users, IPTV Apps ( like smart STB, Smart IPTV, etc, which need to parse our playlists) and also other XC-UI servers restreaming our channels.

Does anyone have any tips regarding cloudlflare DDOS protection configuration? Tks
 

ayouyou

Extended Member
Ext. Member
Joined
Jan 28, 2020
Messages
35
Reaction score
14
Points
19
Location
france
hi
can you add this config in your nginx

set_real_ip_from 0.0.0.0/0;
real_ip_header X-Forwarded-For;
real_ip_recursive on;
 

tugapt

Extended Member
Ext. Member
Joined
Nov 8, 2019
Messages
18
Reaction score
7
Points
14
Location
lisboa
hi
can you add this config in your nginx

set_real_ip_from 0.0.0.0/0;
real_ip_header X-Forwarded-For;
real_ip_recursive on;
Thanks, but what I'm afraid is that CF blocks automatized requests from other servers and IPTV apps. Any CF config tips regarding this?
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

ayouyou

Extended Member
Ext. Member
Joined
Jan 28, 2020
Messages
35
Reaction score
14
Points
19
Location
france
Thanks, but what I'm afraid is that CF blocks automatized requests from other servers and IPTV apps. Any CF config tips regarding this?



So, using Nginx, edit your nginx.conf file and add the following to your http section:

set_real_ip_from 103.21.244.0/22;
set_real_ip_from 103.22.200.0/22;
set_real_ip_from 103.31.4.0/22;
set_real_ip_from 104.16.0.0/12;
set_real_ip_from 108.162.192.0/18;
set_real_ip_from 131.0.72.0/22;
set_real_ip_from 141.101.64.0/18;
set_real_ip_from 162.158.0.0/15;
set_real_ip_from 172.64.0.0/13;
set_real_ip_from 173.245.48.0/20;
set_real_ip_from 188.114.96.0/20;
set_real_ip_from 190.93.240.0/20;
set_real_ip_from 197.234.240.0/22;
set_real_ip_from 198.41.128.0/17;
set_real_ip_from 2400:cb00::/32;
set_real_ip_from 2606:4700::/32;
set_real_ip_from 2803:f800::/32;
set_real_ip_from 2405:b500::/32;
set_real_ip_from 2405:8100::/32;
set_real_ip_from 2c0f:f248::/32;
set_real_ip_from 2a06:98c0::/29;




real_ip_header CF-Connecting-IP;



Sincerely yours
 

redhat

Administrator
Staff member
Administrator
Chief Moderator
Moderator
Joined
Jun 19, 2019
Messages
3,066
Reaction score
14,798
Points
134
Location
root[@]woi


So, using Nginx, edit your nginx.conf file and add the following to your http section:

set_real_ip_from 103.21.244.0/22;
set_real_ip_from 103.22.200.0/22;
set_real_ip_from 103.31.4.0/22;
set_real_ip_from 104.16.0.0/12;
set_real_ip_from 108.162.192.0/18;
set_real_ip_from 131.0.72.0/22;
set_real_ip_from 141.101.64.0/18;
set_real_ip_from 162.158.0.0/15;
set_real_ip_from 172.64.0.0/13;
set_real_ip_from 173.245.48.0/20;
set_real_ip_from 188.114.96.0/20;
set_real_ip_from 190.93.240.0/20;
set_real_ip_from 197.234.240.0/22;
set_real_ip_from 198.41.128.0/17;
set_real_ip_from 2400:cb00::/32;
set_real_ip_from 2606:4700::/32;
set_real_ip_from 2803:f800::/32;
set_real_ip_from 2405:b500::/32;
set_real_ip_from 2405:8100::/32;
set_real_ip_from 2c0f:f248::/32;
set_real_ip_from 2a06:98c0::/29;




real_ip_header CF-Connecting-IP;



Sincerely yours

Info: Current CF IP's to be Whitelist:
 

Mardaki

Extended Member
Ext. Member
Joined
Sep 21, 2019
Messages
19
Reaction score
169
Points
39
Location
FortiGate
Hi,

We're considering protecting our XC-UI Server again DDOS using cloudflare, but we're afraid this will block normal users, IPTV Apps ( like smart STB, Smart IPTV, etc, which need to parse our playlists) and also other XC-UI servers restreaming our channels.

Does anyone have any tips regarding cloudlflare DDOS protection configuration? Tks
Only you need to add IPv4 into your nginx.conf which is on XtreamCodes path and reload nginx service.

173.245.48.0/20
103.21.244.0/22
103.22.200.0/22
103.31.4.0/22
141.101.64.0/18
108.162.192.0/18
190.93.240.0/20
188.114.96.0/20
197.234.240.0/22
198.41.128.0/17
162.158.0.0/15
104.16.0.0/13
104.24.0.0/14
172.64.0.0/13
131.0.72.0/22
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
shape1
shape2
shape3
shape4
shape5
shape6
Top
AdBlock Detected

We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising. 

For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.

I've Disabled AdBlock