# Optimizing Cloudflare Settings for FeedOtter Content Access (2025)

Recently, our team has taken a deep dive into Cloudflare’s latest\
security features and how they interact with FeedOtter. As more organizations increase\
their Cloudflare security posture, we’ve noticed a common trend: website content and\
images can sometimes become inaccessible to FeedOtter. <br>

This means your newsletters may fail to display images or content as expected if\
Cloudflare blocks our requests. To help prevent disruptions, we’ve updated our\
recommended Cloudflare settings for all customers. These adjustments will ensure that\
FeedOtter continues to access your website content securely and reliably—no matter\
how strict your Cloudflare configuration becomes.

### Rule 1: Allow Hotlinking and Content Access

The first step is to set up a rule under Cloudflare Rules that explicitly allows FeedOtter\
to access your images and content. This rule ensures that your website will serve\
images to FeedOtter even when Cloudflare’s hotlink protection is turned on.

<figure><img src="https://2086102864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIdHBGk8cqznUpEqm5g1U%2Fuploads%2FNfUGwYpW5ot19IULYS5l%2F1%20Rules%20-%20IP-Img.png?alt=media&#x26;token=b1d31b8d-74bc-46e9-a431-cc6489beb195" alt=""><figcaption></figcaption></figure>

This rule guarantees that images hosted on your site can be embedded in your\
newsletters without being blocked.

### Rule 2: Whitelist FeedOtter in Security Rules

\
Next, head over to **Security → Security Rules** and create a custom rule specifically\
for FeedOtter. This rule should whitelist:

* FeedOtter’s IP address
* FeedOtter’s User-Agent <br>

In addition, configure the rule to:

* Skip protection when Super Bot Fight Mode or Alert Mode is enabled
* Allow FeedOtter traffic to bypass additional challenges or restrictions
* Ensure image hotlinking remains accessible

<figure><img src="https://2086102864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIdHBGk8cqznUpEqm5g1U%2Fuploads%2FlTkCxnMWd9xYUaWGcl07%2F2%20Security%20-%20Rules%20-%20IP-Agent-Skips.png?alt=media&#x26;token=f5ebfff3-477d-4298-984d-f3756b8a8d82" alt=""><figcaption></figcaption></figure>

**This second rule is especially important because we’ve found that relying on hotlinking**\
**rules alone is often not enough** when Cloudflare increases its protections. Both rules\
must run together to ensure uninterrupted access.

### IP and User Agent&#x20;

```
104.236.230.137
```

```
Mozilla/5.0 (compatible; FeedOtter/2.1; +http://www.feedotter.com/privacy) 
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.78 Safari/537.36
```

### Why Both Rules Matter

In today’s security environment, it’s common to see Cloudflare “tightened up” during\
traffic spikes, security alerts, or when websites enter Under Attack Mode.&#x20;

Without both&#x20;rules in place, FeedOtter may lose access to your content when security settings shift.\
By proactively ensuring these are both in place,&#x20;you safeguard your newsletters against future disruptions.

💬 **Have questions?** Contact us at <success@feedotter.com>.
