Skip to main content

How to Whitelist Tradovate Data Feeds on Your VPS

This quick 2-minute guide walks you through the process of whitelisting Tradovate’s IP addresses and ports to ensure the most stable and reliable connection.

Updated yesterday

Whitelisting Tradovate’s ports and IPs in your Windows VPS firewall can help improve connection stability and reduce interruptions — especially during high-volume trading hours.

Follow the steps below to create both inbound and outbound rules using Windows Defender Firewall with Advanced Security.

Video Guide:

Step 1: Open Windows Defender Firewall

  1. On your VPS, search for and open:

    Windows Defender Firewall with Advanced Security

  2. In the left sidebar, you’ll see options for Inbound Rules and Outbound Rules

Step 2: Whitelist Ports 80 and 443

  1. Go to Inbound Rules

  2. Click New Rule → choose Port → click Next

  3. Select TCP and enter:

80, 443

4. Select Allow the connection → click Next

5. Apply to all profiles (Domain, Private, Public)

6. Name the rule: Tradovate Ports

7. Click Finish

Step 3: Outbound Rule (Ports)

Repeat the same steps above under Outbound Rules

→ Name the rule: Tradovate Ports (Outbound)

Step 4: Whitelist Tradovate IP Addresses (Inbound Rule)

  1. Still under Inbound Rules, click New Rule

  2. Select Custom, then click Next

  3. Navigate to the Scope tab

    • Under “Remote IP address,” select These IP addresses

    • Click Add, and input each of the following IPs one by one:

208.48.16.200 
161.47.139.117
72.3.203.239
34.120.3.201
35.186.238.68

5. Under Protocol and Ports, leave default (Any) → click Next

6. Under Action, select Allow the connection → click Next

7. Apply to all profiles → click Next

8. Name the rule:

Tradovate - Inbound IPs

9. Click Finish

Here is the matching Outbound Rule section for whitelisting Tradovate IPs:

Step 5: Whitelist Tradovate IP Addresses (Outbound Rule)

  1. Go to Outbound Rules, click New Rule

  2. Select Custom, then click Next

  3. Go to the Scope tab

    • Under “Remote IP address,” select These IP addresses

    • Click Add, and enter each of the following IPs one by one:

208.48.16.200 
161.47.139.117
72.3.203.239
34.120.3.201
35.186.238.68

4. Under Protocol and Ports, leave as default (Any) → click Next

5. Under Action, choose Allow the connection → click Next

6. Apply to all profiles → click Next

7. Name the rule:

Tradovate - Outbound IPs

8. Click Finish

Step 6: Confirm Rules Are Active

After adding the rules:

  • Open the Firewall rule list under Inbound and Outbound Rules.

  • Ensure the new rules are listed and enabled (green checkmarks).

  • Restart your platform and test connectivity to confirm improvements.

Pro Tip: Use this PowerShell Script to Automated the Entire Process

# ===============================
# Tradovate Firewall Whitelist Script
# ===============================

# Run as Administrator

Write-Host "Creating Windows Firewall rules for Tradovate..." -ForegroundColor Cyan

# --- Step 2: Inbound Ports 80, 443 ---
New-NetFirewallRule -DisplayName "Tradovate Ports (Inbound)" `
-Direction Inbound -Action Allow -Protocol TCP -LocalPort 80,443 `
-Profile Domain,Private,Public

# --- Step 3: Outbound Ports 80, 443 ---
New-NetFirewallRule -DisplayName "Tradovate Ports (Outbound)" `
-Direction Outbound -Action Allow -Protocol TCP -LocalPort 80,443 `
-Profile Domain,Private,Public

# --- Step 4 & 5: Whitelist Tradovate IPs (Inbound & Outbound) ---
$tradovateIPs = @(
"208.48.16.200",
"161.47.139.117",
"72.3.203.239",
"34.120.3.201",
"35.186.238.68"
)

foreach ($ip in $tradovateIPs) {
# Inbound IP rule
New-NetFirewallRule -DisplayName "Tradovate - Inbound IP $ip" `
-Direction Inbound -Action Allow -RemoteAddress $ip `
-Profile Domain,Private,Public -Protocol Any

# Outbound IP rule
New-NetFirewallRule -DisplayName "Tradovate - Outbound IP $ip" `
-Direction Outbound -Action Allow -RemoteAddress $ip `
-Profile Domain,Private,Public -Protocol Any
}

Write-Host "✅ Tradovate Firewall Rules have been successfully created." -ForegroundColor Green

Did this answer your question?