Filtering provides access control for your phishing campaigns by controlling access to landing pages and proxies based on IP addresses and TLS fingerprints. Filtering is not a primary security measure but a feature to allow or deny access based on simple lists. IP filtering can be bypassed using IP forwarding headers.
Configure filters during campaign creation in the Options section. Custom deny pages
can also be configured to display alternative content to unauthorized visitors.
The filtering overview shows you all available filters and whether they are allow or deny lists.
Click on the name of a filter to edit it.
Filter rules use CIDR notation for IP addresses and JA4 fingerprints for TLS client identification. These rules can be configured as either allow lists (permit only specified IPs/fingerprints) or deny lists (block specified IPs/fingerprints while allowing others).
| Setting | Description |
|---|---|
| Filter Name | Descriptive name to identify this filter rule set |
| Import from File | Upload a text file containing CIDR ranges or JA4 fingerprints for bulk configuration of filter rules |
| Filter Type | Choose between Allow (permit only listed IPs/fingerprints) or
Deny
(block listed IPs/fingerprints) filter behavior |
| CIDR Ranges | List of IP address ranges in CIDR notation. Single IP addresses are automatically
converted to /32 notation for precise matching |
| JA4 Fingerprints | List of JA4 TLS fingerprints. Supports wildcard patterns using * to match partial
fingerprints |
JA4 is a TLS client fingerprinting method that identifies clients based on their TLS handshake characteristics. This allows you to filter traffic based on the client's browser, operating system, or TLS library.
JA4 fingerprints support wildcard patterns using the * character to match any sequence
of characters. This enables flexible filtering based on partial fingerprint matches.
| Pattern | Description |
|---|---|
t13d151*h2_8daaf6152771_* | Matches any fingerprint with specific TLS version, extensions, and cipher hash |
t13d*_*_* | Matches any TLS 1.3 fingerprint with SNI |
* | Matches all fingerprints |
t13d1517h2_* | Matches TLS 1.3 fingerprints with specific extension and ALPN values |
When using both IP and JA4 filtering together, the behavior differs based on filter type:
If a JA4 fingerprint is not available (e.g., non-TLS connections), the JA4 check is skipped and only IP filtering is applied.