Messente avatar logo

How to Whitelist IP Address Range for Messente API

- 5 MIN READ - 27 Aug 2014

How to Whitelist IP Address Range for Messente API

Dynamic IP addresses are the number one enemy for web service providers. Some third party services may require you to whitelist your IP address, which may cause failed API calls in case you forget to update the list when required. What a hassle.

Fret no more – as of today you can specify IP address range using CIDR notation feature just added to Messente API settings!

IP Address Format of CIDR Notation

I am pretty sure you have seen IP address ranges in the format of 192.168.2.0/24, but what does that mean?

Technically it means, that 24 bit of the address in the IP address must match the same as 192.168.2.0. In this example, the IP address range is from 192.168.2.0 to 192.168.2.255.

Another example: if you added 192.168.2.0/25 to Messente API Whitelisted IP addresses list, then the allowed IP range would be just 192.168.2.0 to 192.168.2.127.

Still sounds too complicated? You can simply use a CIDR Utility Tool to calculate the CIDR notation for your IP address ranges.

Whitelisting Range of IP Addresses

Most cloud web service providers also share their public IP address ranges already as CIDR notations, so you can just copy-paste the list to Messente API settings.

Here is a short list of some of the most popular cloud web service providers and their public IP address ranges:

Limitations and Workaround

Using CIDR IP address format, you can not always specify your required range of IP addresses as one line.

For example, if you wanted to whitelist IP address range of 192.168.2.12 to 192.168.2.34, then you would need to add three CIDR notations:

At least you won’t have to insert all 23 IP addresses separately

Also, you can simply just use the CIDR Utility Tool mentioned above to calculate the ranges for you.

Disabling IP Address Validation

We strongly suggest you to get a fixed public IP address if possible. However, if you really-really want to disable the IP address validation (we really strongly suggest against doing this), you could add “0.0.0.0/0″ to the allowed IP address list.

If you still want to disable the IP address validation – at least make sure you use HTTPS for communication. This way you make it pretty hard for anyone to sniff at your traffic.

Jaanus Rõõmus

Jaanus Rõõmus - CTO

Jaanus is co-founder and CTO of Messente and makes sure its wheels keep spinning and Messente always has a full tank of fuel.

Underlying reasons for trends in SMS traffic

25 Apr 2017

In a recent article (it's in Estonian, but you'll get the gist of it in this blog,) Tele2 - a local mobile network operator in the Baltics - highlighted a few interesting trends about the growth or decline of certain types of messaging traffic.

Lauri Kinkar

Lauri Kinkar

Underlying drivers of GLobal SMS traffic

25 Apr 2017

In a recent article (it's in Estonian, but you'll get the gist of it in this blog,) Tele2 - a local mobile network operator in the Baltics - highlighted a few interesting trends about the growth and decline of certain types of SMS messaging traffic.

Lauri Kinkar

Lauri Kinkar

Digging for gold part 2

22 Mar 2017

This is a continuation from the previous article and focuses on the methods of research and how to find leads.
Uku Tomikas

Uku Tomikas

Start sending messages to

for € N/A

Contact us