FiveM IP Lock Base
Features - fully custom php language web server files! - server side code integration included! - the web sever will return a json encoded results from the database - free discord bot ( discord.js ) - discord logs this tool is only for scripters/mappers who want to lock their assets/s
Pré-visualização em Vídeo
Click to load video from YouTube. By watching, you agree to their privacy policy.
FiveM IP Lock Base - Advanced Server Security and Whitelist Management
The FiveM IP Lock Base is a comprehensive server security solution designed to protect your FiveM server from unauthorized access, DDoS attacks, and malicious connections. This powerful whitelist system gives server owners complete control over who can connect to their server by implementing IP-based authentication and access control. Whether you're running a private development server, exclusive roleplay community, or need to restrict access during testing phases, this security base provides the foundation for robust server protection.
Server security is critical in today's FiveM environment where unauthorized access can lead to data breaches, griefing, and server instability. The IP Lock Base acts as your first line of defense, ensuring only authorized players with whitelisted IP addresses can connect to your server, while automatically blocking all unauthorized connection attempts.
What's Included
You receive a complete IP-based security system with administrative panel, whitelist database management, automatic IP verification on player connection, logging system for all connection attempts, and customizable access denial messages. The system includes both server-side security checks and client-side verification to prevent bypass attempts. All whitelist data is stored securely in your server database with encrypted entries to protect sensitive information.
The package includes comprehensive documentation covering installation, configuration, and daily management tasks. You'll also get example configurations for common use cases like development servers, private communities, and staff-only access modes.
Key Features
- IP Whitelist Management - Add, remove, and manage authorized IP addresses through an intuitive admin panel with bulk import/export capabilities
- Automatic Connection Verification - Every connection attempt is validated against your whitelist before players can join, with instant blocking of unauthorized IPs
- Dynamic IP Support - Optional dynamic IP tracking allows authorized players with changing IPs to maintain access after initial verification
- Access Logs and Analytics - Detailed logging of all connection attempts including blocked IPs, timestamps, and player identifiers for security auditing
- Multi-Admin Support - Multiple staff members can manage the whitelist simultaneously with permission-based access levels
- Custom Denial Messages - Configure personalized kick messages for unauthorized users with instructions on how to request access
- VPN Detection - Optional VPN and proxy detection to prevent users from bypassing IP restrictions
- IP Range Whitelisting - Whitelist entire IP ranges for organizations, gaming centers, or trusted networks
- Temporary Access Passes - Generate time-limited whitelist entries for guests or trial periods
- Export/Import Functionality - Backup and transfer whitelist data between servers or for disaster recovery
Perfect For
- Private development servers requiring strict access control during script testing
- Exclusive roleplay communities with membership-only access requirements
- Staff training servers where only authorized personnel should connect
- Beta testing environments with limited participant slots
- High-security servers needing additional protection beyond standard whitelisting
- Gaming organizations running closed servers for members only
- Streamer servers wanting to control exactly who can join during broadcasts
Technical Details
- Performance Impact: Minimal - typically 0.01-0.02ms connection overhead for IP verification
- Database: Uses MySQL/MariaDB for whitelist storage with optimized queries
- Security Method: IP address verification combined with optional identifier checks
- Admin Panel: Web-based interface accessible via in-game command or external browser
- Update Frequency: Whitelist changes take effect immediately without server restart
Installation
- Extract the IP Lock Base files to your server's resources folder
- Import the provided SQL file to create the whitelist database tables
- Configure your admin identifiers in the config.lua file
- Add ensure fivem-ip-lock-base to your server.cfg (place near the top for early loading)
- Restart your server and use the admin command to access the whitelist panel
- Add your first whitelisted IP addresses and test connections
Framework Compatibility
- ✅ Standalone - Works independently without requiring ESX or QBCore
- ✅ ESX Compatible - Integrates seamlessly with ESX servers
- ✅ QBCore Compatible - Fully functional with QBCore framework
- ✅ Universal - Compatible with any FiveM server configuration
What Makes It Stand Out
Unlike basic whitelist systems that only check player identifiers, the IP Lock Base provides network-level security that blocks unauthorized connections before they can even attempt to join your server. This prevents connection spam, DDoS attempts, and unauthorized access at the most fundamental level. The combination of IP verification, optional VPN detection, and comprehensive logging creates a security solution that rivals commercial server protection services.
The system's flexibility allows you to run anything from completely locked private servers to semi-public servers with IP restrictions only for specific roles or areas. The temporary access pass feature is particularly valuable for streamers who need to grant short-term access without permanently whitelisting IPs.
Admin Management
The administrative interface is designed for ease of use while providing powerful management capabilities. Admins can search whitelist entries, filter by date added, view connection history for specific IPs, and receive alerts when blocked connection attempts exceed threshold limits. The bulk management tools allow you to import entire lists of IPs from spreadsheets or export your current whitelist for backup purposes.
Security Best Practices
For maximum security, we recommend combining IP Lock Base with identifier-based whitelisting and enabling VPN detection. Use IP range whitelisting sparingly and only for trusted networks. Regularly review your access logs to identify suspicious connection patterns and update your whitelist to remove inactive or compromised entries. Enable temporary access passes for any untrusted users rather than permanent whitelist entries.
https://www.youtube.com/watch?v=raWf7-LNR3A





