home
navigate_next
Blog
navigate_next
Articles

🆕 What is a IP white listing?

AUTHOR:
HollaExÂŽ
• Date Published:
June 24, 2025
Learn how IP whitelisting protects crypto accounts and platforms by restricting access to trusted networks—ideal for API users & operators.
🆕 What is a IP white listing?

Introduction

IP whitelisting is a security technique where you define a list of trusted IP addresses that are allowed to access a system or resource. Any connection attempt from an IP not on the list is blocked, even if the person has the correct password or API key. This method is widely used to strengthen the security of critical systems, applications, and online accounts.

‍

How Does IP Whitelisting Work?

When IP whitelisting is enabled, the service owner creates a list—called a “whitelist”—of IP addresses that are permitted to connect. This list is compared against every incoming connection request:

  • If the request comes from a whitelisted IP: Access is granted.
  • If the request comes from any other IP: Access is denied.

This simple approach makes it much harder for attackers to reach sensitive systems, even if they’ve obtained passwords or credentials.

Typical places where IP whitelisting is used:

  • Admin dashboards and management portals
  • APIs and automation endpoints
  • Secure databases and server infrastructure
  • Remote desktop or SSH access

Use-Cases for Crypto Exchange Users

Advanced users, such as traders or businesses interacting with the exchange via APIs, can also benefit from IP whitelisting.

Key Scenarios:

  1. API Key Security
    Most exchanges let users specify which IP addresses are allowed to use their API keys. This way, if your API key is leaked or stolen, it can’t be abused unless the attacker is connecting from your approved location (for example, your company server or cloud environment).
  2. Withdrawal Protection
    Some exchanges offer the option to allow cryptocurrency withdrawals only from whitelisted IP addresses, making it nearly impossible for an attacker to steal funds even if they gain access to your account.
  3. Account Login Hardening
    Users can choose to restrict login attempts to specific IPs. If your password is stolen, it won’t work unless the login is coming from your allowed locations.
  4. Layered Security for Power Users
    Combining IP whitelisting with features like two-factor authentication (2FA), withdrawal whitelists, and device verification gives users maximum protection for high-value accounts.

‍

Step-by-steps for setting up a static IP to use for your whitelisting needs?

1. Open Network Settings

  • Click the Start button and select Settings (gear icon).
  • Click on Network & Internet.

2. Choose Your Network Connection

  • On the left side menu, select Wi-Fi or Ethernet, depending on your connection.
  • Click on Change adapter options.

3. Access Adapter Properties

  • Right-click on your active network adapter and select Properties.
    ‍

4. Set the IP Address Manually

  • Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.
  • Choose Use the following IP address.

Enter the following details:

  • IP address: Set a unique address (e.g., 192.168.1.100)
  • Subnet mask: Typically 255.255.255.0
  • Default gateway: Usually your router’s IP address (commonly 192.168.1.1)

Set your DNS server addresses (optional, but recommended):

  • Preferred DNS server: Usually your router or a public DNS (e.g., 8.8.8.8)
  • Alternate DNS server: (optional) e.g., 8.8.4.4

5. Confirm and Apply

  • Click OK to apply the settings.
  • Click Close on the adapter properties window.

6. Verify Your New IP Address

  • Open Command Prompt (type cmd in the Start menu).
  • Type ipconfig and press Enter.
  • Confirm your settings under the active connection.

You now have a static IP address set up on your Windows laptop!

‍

Why Is IP Whitelisting Important?

  • Reduces attack surface: Only trusted IPs can access the system, blocking most opportunistic hackers.
  • Extra layer of protection: Even if someone steals your credentials, they can’t get in unless they’re connecting from an approved location.
  • Helps with compliance: Many regulations require extra measures for sensitive data, and IP whitelisting is a common best practice.

‍

Crypto Exchange's with IP whitelisting

Once you've got your static IP setup on your main computer, you can go ahead and use that IP on the crypto platform you have an account with by setting up an API key on your account. All exchange generally have similar steps but here are a few below:

‍

HollaEx Pro:

Log in, navigate https://pro.hollaex.com/security?apiKeys, once there you can generate API key and active IP whitelisting when using sensitive actions such as withdrawals. You also will need to active 2FA (two-factor auth, also known as OTP).

‍

KuCoin:

Log in to your account, go to API Management, create a new API key, and then configure IP whitelisting within the API key settings.

‍

Binance:

Log in, go to API Management, create a new API, and then configure IP whitelisting. You can usually find this option in the API details section.

‍

OKX:

Log in, navigate to API Management, create an API, and then configure IP whitelisting within the API settings.

‍

BONUS: Use-Cases for Crypto Exchange Operators

As added bonus we've added a section on business application of crypto IP whitelisting. This is particularly important in crypto due to the fact financial asset can be moved so easily and to maintain a safe working enviroment for teams operating on a crypto standard. If you operate a crypto business for example, such as exchange or any financial platform, IP whitelisting will be a pivotal tool for operations. Below are a few key use cases below:

‍

Key Scenarios:

  1. Admin Access Control
    Restrict access to the exchange’s admin panel, back office, or sensitive configuration screens so that only staff connecting from trusted networks—like your office, VPN, or home office—can log in.
  2. Securing APIs
    Limit access to private or high-privilege APIs (such as fund management or order control endpoints) to pre-approved IP addresses only. This helps prevent unauthorized programmatic access from outside your organization.
  3. Infrastructure Protection
    Lock down access to servers, databases, and remote terminals (e.g., SSH) so that only the technical team’s office or specific VPN addresses are accepted.
  4. Minimizing Exposure to Attacks
    By blocking any non-whitelisted IPs, you reduce the chances of brute-force attacks, automated scans, and other intrusion attempts, especially on critical systems.

‍

Example of crypto exchange business operator assigning an IP address to an API key to allow for secure access to trading, withdrawing, financial data retrieval and a means to automate business operations. For more information, contact us here.

‍

Tips & Best Practices

  • Review and update your whitelist as team members, offices, or infrastructure change.
  • Use a VPN with a fixed exit IP if your internet connection has a dynamic IP address.
  • Never share your whitelist or API keys in public forums or with untrusted parties.
  • Combine IP whitelisting with other security controls, like strong passwords and multi-factor authentication, for the best results.

‍

Summary

IP whitelisting lets you tightly control who can access your systems by restricting access to only trusted locations. For crypto exchange operators, it’s essential for securing admin access, APIs, and infrastructure. For users—especially those using API keys or making large withdrawals—IP whitelisting adds an important, practical layer of defense against account takeover and fraud.

‍

--

‍

Looking for a secure white-label solution? Check out the award winning crypto exchange for business here.

arrow_back
Back to blog