In Settings > Org > Project > Inbound Filters > Custom Filters, it is possible to filter events triggered by requests from a list of IP addresses.
However, it seems to only support individual IP addresses, not IP network prefixes/ranges such as 123.123.123.0/24.
Some SaaS-based tools such as vulnerability scanners operate from a wider IP network, and it would be good to be able to filter out events triggered by such tools (for example in your test/integration environment) without having to enter several hundred/thousand individual addresses.
Solution Brainstorm
Add filtering support for IP prefix/network ranges in CIDR format, while still allowing individual IP addresses:
Problem Statement
In Settings > Org > Project > Inbound Filters > Custom Filters, it is possible to filter events triggered by requests from a list of IP addresses.
However, it seems to only support individual IP addresses, not IP network prefixes/ranges such as
123.123.123.0/24
.Some SaaS-based tools such as vulnerability scanners operate from a wider IP network, and it would be good to be able to filter out events triggered by such tools (for example in your test/integration environment) without having to enter several hundred/thousand individual addresses.
Solution Brainstorm
Add filtering support for IP prefix/network ranges in CIDR format, while still allowing individual IP addresses:
Product Area
Ingestion and Filtering