Security
Please see this page for more info about our policies and procedures related to security, as well our compliance information.
Authenticating requests from Honeybadger
Requests sent from Honeybadger servers for source maps, web hooks, and
uptime checks include the header Honeybadger-Token
which is a secret token
derived from your api key. The Honeybadger token may be used to authenticate the
request (note that this token will change if you reset your project API key):
Honeybadger-Token: your-token
You can find your token on the API Key tab in project settings.
Firewalls
To use Honeybadger behind a firewall, you'll need to configure your firewall to allow connections to our servers. Here's the list:
For exception monitoring
Whitelist the following IPs for outgoing traffic:
- 34.196.34.99
- 34.195.239.200
- 34.193.240.253
- 34.225.218.213
- 52.5.3.101
For webhooks, sourcemaps, and uptime monitoring
We use a dynamic range of IPs for outbound requests to your servers. Please use the Honeybadger-Token header, described above, to authenticate requests coming from our servers.
Reporting Issues
If you've noticed a possible security issue, please let us know at security@honeybadger.io. Please note that we do not pay bounties for vulnerability reports.
Hall of Fame
We'd like to thank the following people for helping us keep Honeybadger secure:
- Manish Bhattacharya
- Jayson Zabate
- Aditya Agrawal
- Evan Ricafort
- Osanda Malith Jayathissa
- Madhu Akula
- Abdul Wasay
- Shivam Kumar Agarwal
- Sumit Sahoo
- Adam Enger
- Sajibe Kanti
- Md. Nur A Alam Dipu
- Pethuraj M
- Tinu Tomy
- Hariharan.S
- Anil Tom
- Pranshu Tiwari
- Ranjeet Kumar Singh
- Vikas Srivastava
- Pankaj Kumar Thakur
- Pratik Vinod Yadav
- Mrunal Chawda
- Bharat
- Gaurav Solanki
- Mahendra Purbia
- Aditya Soni
- Kunal Mhaske
- Suresh Kumar
- Agrah Jain
- Ome Mishra
- Dhanu Maalaian
- Bilal Abdul Muqeet
- Shaikh Sameer