Managing cPhulk in WHM

Managing cPhulk in WHM

cPHulk is a service that provides protection for your server against brute force attacks. A brute force attack is when a hacker tries to gain access by guess your user name and passwords. usually by using automated systems commonly known as bots. In this tutorial we will go over the configuration options available in cPHulk and how to access this interface using WHM.

In order to access your cPHulk interface you will have to first log into your server via WHM. Once you have accessed WHM you can find the option “cPHulk Brute Force Protection” under the Security Center section. Alternatively you can simply type “cphulk” into the search box and it will narrow your choices down.


To enable and disable  cPHulk  you simply click the slider option to toggle it off or on.



Once you access cPHulk section of WHM you will see several tabs. These tabs let you set various settings in cPHulk. Below we will go over how these work.

Configuration Settings

You can configure the following Configuration Settings options:


If you click on the “Whitelist Management” tab you will see a screen that looks like the one below. We highly recommend adding the IP addresses you will be connecting from to your whitelist to avoid any log in errors. The Comment section simply allows to you to label the IP addresses you have added for quick reference.


The next tab labeled “Blacklist Management” is the exact opposite of the whitelist tab. This tab lets you block specific IP address and ranges. If you notice repeated failed attempts to access your server from an unknown IP address you should add it to your blacklist to prevent any future attempts. When clicking on the blacklist management tab you will get a screen that looks like the picture below.


The “History Report” allows you to view all the failed attempts to access your server. From this tab you may also clear log data and that will release any current lock outs.



Was this article helpful?

Related Articles

Leave A Comment?

You must be logged in to post a comment.