Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI Studio
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Smart Web Security
  • Getting started
    • Overview
    • Security profiles
    • WAF
    • ARL (request limit)
    • Rules
    • Conditions
    • Lists
    • Protecting domains
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Yandex Cloud lists
  • Custom lists
  1. Concepts
  2. Lists

Lists

Written by
Yandex Cloud
Updated at January 27, 2025
  • Yandex Cloud lists
  • Custom lists

Note

The IP lists feature is at the Preview stage.

With lists, you can create traffic filtering rules for IP address groups. You can add a list as a condition when creating rules in the security profile, WAF, or ARL. Thus, you can block some traffic, allow it through, or direct it to SmartCaptcha at the IP check step.

There are two types of lists:

  • Provided by Yandex Cloud.
  • Custom.

Yandex Cloud listsYandex Cloud lists

Yandex Cloud lists are preset groups of IP addresses selected based on a particular attribute. These lists are regularly updated and provided as a part of the Smart Web Security feature set. Their purpose is to create an individual security strategy and automatically block potentially malicious traffic.

Description of preset lists:

  • is_ddoser: IP addresses used in DDoS attacks. This list is based on data provided by different research organizations and security departments.
  • is_hosting: IP addresses of hosting providers.
  • is_hosting: IP addresses of mobile providers.
  • is_tor: IP addresses of the Tor network used for traffic anonymization.
  • is_proxy: IP addresses of public proxy servers. Access via a proxy can be used to hide the real IP address and potentially malicious activities.
  • is_vpn: IP addresses of VPN providers. VPN is used for private access and spoofing IP addresses.
  • is_ml_vpn: VPN provider IP addresses detected using machine learning algorithms.
  • is_anonimous: IP addresses of anonymous networks. People often use such networks to hide their identity.

You cannot change or delete the preset lists.

Custom listsCustom lists

In addition to preset lists, you can create your custom IP lists.

We recommend grouping them into these categories:

  • IP blacklist: IP addresses used for attacks against your infrastructure or other undesirable actions, e.g., spam. You can block queries from these IP addresses automatically without applying the Smart Web Security rules to them.

  • IP whitelist: IP addresses that are trusted within your organization. For example, branch office, partner, or contractor addresses. Queries you get from these can be let through automatically without additional checks on the Smart Web Security side.

Smart Web Security allows creating IP lists manually or by uploading ready-made files in txt or csv formats.

See alsoSee also

  • Managing IP lists
  • Conditions

Was the article helpful?

Previous
Conditions
Next
Protecting domains
© 2025 Direct Cursus Technology L.L.C.