IP Addresses for Pentest
Aikido uses dedicated IP addresses and request headers to perform pentesting of your environment. To prevent connectivity issues, rate limiting, or security blocks, add these IPs and headers to your firewall’s allowlist or other security software.
IP Addresses
EU-based IP addresses
34.252.102.184
52.48.122.82
52.49.182.62
52.209.168.11
52.210.210.125
54.76.103.212
54.194.175.200
54.217.255.121
US-based IP addresses
3.226.27.188
34.237.95.50
44.209.154.183
52.204.120.162
54.80.175.207
54.227.161.94
98.88.145.68
98.91.68.215
Optional IP addresses
Used for troubleshooting with support.
79.127.239.171
Request Headers
All requests from Aikido's pentesting include one of the following value for the User-Agent header. These can be used to identify pentest requests in your SIEM or WAF request logs.
aikido-pentest-agentaikido-pentest-agent/1.0 (Agent <AGENT_UUID>)
Third party provider instructions
For instructions on whitelisting IP addresses with third-party providers, refer to the following resources:
Cloudflare Turnstile does not support allowlisting specific client IP addresses. If you need to bypass Turnstile for Aikido scanning traffic, you must do it in your application code. We recommend bypassing only when both conditions are true:
The request originates from an Aikido IP range
The request includes the
aikidoUser Agent in headers as described above
For WAFs behind Application Load Balancers or CloudFront, your WAF should check the last IP address in the
X-Forwarded-Forheader.
Use the "bypass" action for trusted IPs
Testing Internal Applications
If your application is hosted on a strictly private network, VPN, or intranet that cannot accept inbound traffic from the public internet, you can use the Aikido Broker for Internal Applications
The Broker requires installing an agent in your infrastructure. We recommend this only when standard IP allowlisting is not possible.
Last updated
Was this helpful?