Home Dashboard Help How to add Catcher24 IPs to the Cloudflare allowlist

How to add Catcher24 IPs to the Cloudflare allowlist

Last updated on Apr 16, 2026

To ensure Catcher24 can successfully scan your targets without being blocked by Cloudflare's security features, you must create a WAF Custom Rule to allow our scanning engines.

Step-by-step guide

  1. Log in to your Cloudflare dashboard and select your domain.

  2. Navigate to Security > Security rules.

  3. Click + Create rule > Custom rules

  4. Name the rule: e.g., "Allow Catcher24 Scanners".

  5. Configure the "If incoming requests match..." section:

  6. Configure the "Then take action..." section:

    • Choose action: Select Skip.

    • WAF components to skip: Check the boxes for WAF components to skip. Click the More components to skip option and check all extra boxes as well.

  7. The rule will look like this:

  8. Click Deploy.

Note: Using the "Skip" action is preferred over "Allow" because "Allow" only bypasses the firewall, whereas "Skip" prevents Cloudflare from presenting CAPTCHAs or JavaScript challenges that can block automated scanners.

⚠️ Important Note: Cloudflare Validation Checks

Even with the Catcher24 IPs added to your allowlist, Cloudflare performs certain Validation Checks that run before your custom rules are evaluated. These checks cannot be disabled or bypassed by an allowlist.

According to Cloudflare's documentation, this component blocks:

  • Malformed HTTP requests.

  • Specific attack patterns in HTTP headers (e.g., Shellshock attacks).

  • Requests that trigger "sanity checks" early in Cloudflare's infrastructure.

How this affects your scans: Because these checks happen at the Cloudflare edge, before the request reaches your "Allow/Skip" rule, some specific scan probes sent by Catcher24 may still be blocked.

  • Scans that lose connection or fail.

  • Limited scan results on Cloudflare targets.

  • Blocked Probes: You may see scan logs indicating that certain connection attempts or specific exploit payloads failed, even though the IP is whitelisted.

This is standard Cloudflare behavior and generally means Cloudflare is doing its job to protect your application from malformed traffic, even from authorized scanners.

Suggestions for mitigating interference

If you have already added the Catcher24 IPs to your allowlist but continue to see scan errors or incomplete results, the behavior is likely due to Cloudflare's mandatory validation checks which cannot be bypassed by standard allowlisting.

Because these checks cannot be disabled directly on your main domain, we recommend one of the following approaches:

1. Create a dedicated subdomain

This is the most effective workaround for production environments.

  • Setup: Create a specific subdomain (e.g., catcher-scan.yourdomain.com) and point its DNS to the same backend IP as your main website.

  • Configuration: On this specific subdomain, you can safely lower Cloudflare's security settings without affecting your main site users.

    • Disable "Browser Integrity Check".

    • Disable "Always Use HTTPS" (if necessary for specific HTTP probes).

    • Disable "Bot Fight Mode" or "Super Bot Fight Mode".

  • Action: Add this subdomain as your target in the Catcher dashboard.

2. Scan a staging environment

If you have a staging or development environment that mirrors your production code, use that as your primary scan target.

  • Benefit: Staging environments often have relaxed WAF configurations or can be configured to bypass Cloudflare entirely (e.g., restricted by IP access only), allowing Catcher24 to scan the application logic without WAF interference.

3. Cloudflare Enterprise options

If you are on a Cloudflare Enterprise plan, you may have access to advanced settings that are not available on standard plans.

  • Enterprise Features: Enterprise support can sometimes offer higher-level configuration options, such as custom "Host Header" modification or classifying specific scanner IPs as trusted traffic to bypass mandatory validation checks. Please contact your Cloudflare account manager if this applies to you.