Skip to main content

How to Whitelist Tradovate Data Feeds on Your VPS

This quick 2-minute guide walks you through the process of whitelisting Tradovate’s IP addresses and ports to ensure the most stable and reliable connection.

Updated over a month ago

Whitelisting Tradovate’s ports and IPs in your Windows VPS firewall can help improve connection stability and reduce interruptions — especially during high-volume trading hours.

Follow the steps below to create both inbound and outbound rules using Windows Defender Firewall with Advanced Security.

Video Guide:

Step 1: Open Windows Defender Firewall

  1. On your VPS, search for and open:

    Windows Defender Firewall with Advanced Security

  2. In the left sidebar, you’ll see options for Inbound Rules and Outbound Rules

Step 2: Whitelist Ports 80 and 443

  1. Go to Inbound Rules

  2. Click New Rule → choose Port → click Next

  3. Select TCP and enter:

80, 443

4. Select Allow the connection → click Next

5. Apply to all profiles (Domain, Private, Public)

6. Name the rule: Tradovate Ports

7. Click Finish

Step 3: Outbound Rule (Ports)

Repeat the same steps above under Outbound Rules

→ Name the rule: Tradovate Ports (Outbound)

Step 4: Whitelist Tradovate IP Addresses (Inbound Rule)

  1. Still under Inbound Rules, click New Rule

  2. Select Custom, then click Next

  3. Navigate to the Scope tab

    • Under “Remote IP address,” select These IP addresses

    • Click Add, and input each of the following IPs one by one:

208.48.16.200 
161.47.139.117
72.3.203.239
34.120.3.201
35.186.238.68

5. Under Protocol and Ports, leave default (Any) → click Next

6. Under Action, select Allow the connection → click Next

7. Apply to all profiles → click Next

8. Name the rule:

Tradovate - Inbound IPs

9. Click Finish

Here is the matching Outbound Rule section for whitelisting Tradovate IPs:

Step 5: Whitelist Tradovate IP Addresses (Outbound Rule)

  1. Go to Outbound Rules, click New Rule

  2. Select Custom, then click Next

  3. Go to the Scope tab

    • Under “Remote IP address,” select These IP addresses

    • Click Add, and enter each of the following IPs one by one:

208.48.16.200 
161.47.139.117
72.3.203.239
34.120.3.201
35.186.238.68

4. Under Protocol and Ports, leave as default (Any) → click Next

5. Under Action, choose Allow the connection → click Next

6. Apply to all profiles → click Next

7. Name the rule:

Tradovate - Outbound IPs

8. Click Finish

Step 6: Confirm Rules Are Active

After adding the rules:

  • Open the Firewall rule list under Inbound and Outbound Rules.

  • Ensure the new rules are listed and enabled (green checkmarks).

  • Restart your platform and test connectivity to confirm improvements.

Pro Tip: Use this PowerShell Script to Automated the Entire Process

# ===============================
# Tradovate Firewall Whitelist Script
# ===============================

# Run as Administrator

Write-Host "Creating Windows Firewall rules for Tradovate..." -ForegroundColor Cyan

# --- Step 2: Inbound Ports 80, 443 ---
New-NetFirewallRule -DisplayName "Tradovate Ports (Inbound)" `
-Direction Inbound -Action Allow -Protocol TCP -LocalPort 80,443 `
-Profile Domain,Private,Public

# --- Step 3: Outbound Ports 80, 443 ---
New-NetFirewallRule -DisplayName "Tradovate Ports (Outbound)" `
-Direction Outbound -Action Allow -Protocol TCP -LocalPort 80,443 `
-Profile Domain,Private,Public

# --- Step 4 & 5: Whitelist Tradovate IPs (Inbound & Outbound) ---
$tradovateIPs = @(
"208.48.16.200",
"161.47.139.117",
"72.3.203.239",
"34.120.3.201",
"35.186.238.68"
)

foreach ($ip in $tradovateIPs) {
# Inbound IP rule
New-NetFirewallRule -DisplayName "Tradovate - Inbound IP $ip" `
-Direction Inbound -Action Allow -RemoteAddress $ip `
-Profile Domain,Private,Public -Protocol Any

# Outbound IP rule
New-NetFirewallRule -DisplayName "Tradovate - Outbound IP $ip" `
-Direction Outbound -Action Allow -RemoteAddress $ip `
-Profile Domain,Private,Public -Protocol Any
}

Write-Host "✅ Tradovate Firewall Rules have been successfully created." -ForegroundColor Green

Did this answer your question?