Overview
When Everflow fires a server-to-server (S2S) postback to notify your advertiser's system of a conversion, the request originates from one of our dedicated server IP addresses. Your advertiser's firewall must recognize and allow these IPs; otherwise, postback signals will be silently blocked - creating the "Silent Blackout" scenario where conversions vanish without warning or error codes.
This article provides the complete list of Everflow Server IPs, explains why whitelisting is mandatory for revenue protection, and includes interactive tools to help you configure your firewall correctly across multiple platforms.
Everflow Postback IP Addresses
Copy individual IPs or use "Copy All" to get the complete list for your firewall configuration:
Why IP Whitelisting Matters
Without proper IP whitelisting, your firewall may block Everflow's postback requests, creating catastrophic but invisible conversion loss:
Unlike standard tracking errors that show up in your reports, a firewall block creates an invisible failure. Your postback appears to send successfully from Everflow's side, but it never reaches your advertiser's server to record the conversion.
The Result: Lost conversions with no error message, no warning, and no way to know revenue is bleeding away until it's too late.
35.196.95.104
✅ Access granted
✅ Revenue tracked
35.196.95.104
⛔ Blocked silently
⚠️ Conversion lost
• Conversions appear in reports
• Partners get credited
• Revenue flows normally
• 200 OK response codes
What happens:
Firewall recognizes Everflow's IPs and allows postback signals through. Your advertiser's server receives and processes conversion data normally.
• Clicks tracked normally
• No error codes in Everflow
• Zero conversions
• Partners complain
What happens:
Firewall silently drops Everflow's postback requests. Server never receives conversion signal. You lose revenue with no warning or error message.
Think of postbacks like delivery trucks arriving at a gated community. The firewall is the security guard checking IDs at the gate.
How To Whitelist IPs In Your Firewall
Select your firewall/cloud platform below for step-by-step whitelisting instructions. Each guide is tailored to the specific interface and terminology of your infrastructure:
• List name: everflow-postback-ips
• Description: Everflow server IPs for postback whitelisting
• Add entries: Paste all 9 IPs (one per line)
• Click Deploy
Configure the rule:
• Rule name: Allow Everflow Postbacks
• If incoming requests match:
Field: Source IP Address
Operator: is in list
Value: everflow-postback-ips
• Then take action: Skip → Select All remaining custom rules and All managed rulesets
• Click Deploy
Legacy Dashboard: Security → WAF → Tools → IP Access Rules
For each IP:
• Value: Enter one Everflow IP (e.g., 35.196.95.104)
• Action: Allow
• Zone: This website (or All websites in account)
• Note: "Everflow Postback Server"
• Type: HTTPS (or Custom TCP if using non-standard port)
• Protocol: TCP
• Port: 443 (or your postback endpoint port)
• Source: Custom → Enter IP with /32 (e.g.,
35.196.95.104/32)• Description: "Everflow Postback"
✅ Default Limit: 60 rules per security group (adjustable via AWS Support).
(Direct URL: console.cloud.google.com/net-security/firewall-manager/firewall-policies/list)
Alternative: VPC Network → Select your network → Firewalls tab
• Name: allow-everflow-postbacks
• Direction of traffic: Ingress
• Action on match: Allow
• Targets: Specified target tags (or All instances)
• Source filter: IPv4 ranges
• Source IPv4 ranges: Enter IPs - see critical note below ⚠️
Correct: Type
35.196.95.104/32 → Press Tab → Type 34.138.191.250/32 → Press TabIncorrect: Comma-separated format only works in gcloud CLI, not Console UI.
• Select tcp → Enter port 443 (or your custom port)
• Priority: 1000 (default) or lower number for higher priority
✅ Modern Approach: Google recommends Global Network Firewall Policies over legacy VPC rules for multi-VPC environments.
For each Everflow IP, create a rule:
• Source: IP Addresses
• Source IP addresses: Enter one IP (e.g., 35.196.95.104)
• Destination: Any (or specific subnet)
• Service: HTTPS
• Action: Allow
• Priority: 100-200 (lower = higher priority)
• Name: Allow-Everflow-IP-1
35.196.95.104, 34.138.191.250, 34.138.95.128✅ Stateful Firewall: Return traffic automatically allowed. Rule changes only affect new connections.
✅ Limits: Maximum 1,000 rules per NSG, 5,000 NSGs per subscription.
(Or navigate via: WHM → Plugins → ConfigServer Security & Firewall)
Add each Everflow IP to the allowlist. This method applies changes immediately without restart.
Add each Everflow IP, one per line with comment:
34.138.191.250 # Everflow Postback
34.138.95.128 # Everflow Postback
34.91.131.78 # Everflow Postback
34.147.37.169 # Everflow Postback
34.147.67.230 # Everflow Postback
34.73.83.118 # Everflow Postback
35.227.72.33 # Everflow Postback
34.74.122.67 # Everflow Postback
IP.ADD.RE.SS # Comment with space-hash-space. Comments must be on the same line as the IP.
• Editing csf.allow file in WHM → Click Restart csf+lfd
• Direct file edit via SSH → Run
csf -rNo Restart Required:
• Quick Allow (WHM GUI) → Applies immediately
• Command:
csf -a IP.ADD.RE.SS → Applies automatically
Or enable:
IGNORE_ALLOW = "1" in csf.conf to automatically treat csf.allow entries as csf.ignore.
Verify Your Configuration
After whitelisting Everflow IPs, use this diagnostic checklist to verify everything is configured correctly. Work through each layer systematically to identify any remaining issues:
Verify all 9 Everflow Server IPs are listed in your firewall's whitelist or allowlist.
Where to look:
• AWS: EC2 → Security Groups → Inbound Rules
• Cloudflare: Security → WAF → IP Access Rules
• Google Cloud: VPC Network → Firewall → Rules
• Azure: Network Security Groups → Inbound Rules
• cPanel: ConfigServer Firewall → Allow IPs
Ensure your firewall allows traffic to the port your postback endpoint uses (typically port 443 for HTTPS or port 80 for HTTP).
Firewall rules are evaluated by priority. A "deny all" rule with higher priority can block Everflow IPs even if they're in your allowlist.
Fix:
Ensure your Everflow IP allow rules have a higher priority (lower number in AWS/Azure) than any broad deny rules.
In Everflow, navigate to: Reporting → Partner Postback Report
What you're looking for:
• Response Code: 200 or 300-series = Success ✅
• Response Code: 4xx (400, 403, 404) = Endpoint issue or firewall block ⛔
• Response Code: 5xx (500, 502, 504) = Server error ❌
• No Response / Timeout = Firewall blocking silently 🚫
In the Partner Postback Report, click the ⋮ menu on any row → Select "View Debug Info"
Look for clues:
• "Connection refused" = Firewall is blocking
• "Connection timeout" = Server not reachable or firewall dropping packets
• "403 Forbidden" = Server received request but denied it (check IP whitelist on server)
• "SSL handshake failed" = Certificate issue (see Layer 3)
Review your server's HTTP access logs to see if requests from Everflow IPs are arriving.
What you should see:
Insecure
http:// endpoints may be blocked by modern browser security or Everflow's "Force SSL" settings.Action:
Confirm your postback endpoint URL starts with
https:// not http://Use SSL Labs Test (ssllabs.com/ssltest) to verify your server's SSL configuration.
Common issues:
• Certificate expired
• Self-signed certificate (not trusted)
• Incorrect certificate chain
• TLS version mismatch (must support TLS 1.2+)
Request IT Support
If your technical team handles firewall configuration, use this template generator to create a professional, complete request email with all necessary details:
➔ How To Test Partner Postbacks
➔ IP & Domain Whitelisting For Advertisers