Filtering

Filtering provides access control for your phishing campaigns by controlling access to landing pages and proxies based on IP addresses and TLS fingerprints. Filtering is not a primary security measure but a feature to allow or deny access based on simple lists. IP filtering can be bypassed using IP forwarding headers.

Configure filters during campaign creation in the Options section. Custom deny pages can also be configured to display alternative content to unauthorized visitors.

Overview

The filtering overview shows you all available filters and whether they are allow or deny lists.

Phishing Club - Filtering overview
Filtering overview

Click on the name of a filter to edit it.

Create new Filter

Filter rules use CIDR notation for IP addresses and JA4 fingerprints for TLS client identification. These rules can be configured as either allow lists (permit only specified IPs/fingerprints) or deny lists (block specified IPs/fingerprints while allowing others).

Phishing Club - Create Filter
Filter Rule Configuration Interface
Filter Configuration Options
Setting Description
Filter Name Descriptive name to identify this filter rule set
Import from File Upload a text file containing CIDR ranges or JA4 fingerprints for bulk configuration of filter rules
Filter Type Choose between Allow (permit only listed IPs/fingerprints) or Deny (block listed IPs/fingerprints) filter behavior
CIDR Ranges List of IP address ranges in CIDR notation. Single IP addresses are automatically converted to /32 notation for precise matching
JA4 Fingerprints List of JA4 TLS fingerprints. Supports wildcard patterns using * to match partial fingerprints

JA4 Fingerprints

JA4 is a TLS client fingerprinting method that identifies clients based on their TLS handshake characteristics. This allows you to filter traffic based on the client's browser, operating system, or TLS library.

Wildcard Support

JA4 fingerprints support wildcard patterns using the * character to match any sequence of characters. This enables flexible filtering based on partial fingerprint matches.

JA4 Wildcard Pattern Examples
Pattern Description
t13d151*h2_8daaf6152771_* Matches any fingerprint with specific TLS version, extensions, and cipher hash
t13d*_*_* Matches any TLS 1.3 fingerprint with SNI
* Matches all fingerprints
t13d1517h2_* Matches TLS 1.3 fingerprints with specific extension and ALPN values

Filter Behavior

When using both IP and JA4 filtering together, the behavior differs based on filter type:

  • Allow Lists: Both the IP address AND JA4 fingerprint must match for access to be granted. If either check fails, access is denied.
  • Deny Lists: If either the IP address OR JA4 fingerprint matches the deny list, access is blocked.

If a JA4 fingerprint is not available (e.g., non-TLS connections), the JA4 check is skipped and only IP filtering is applied.