I can only share part of the information due to its sensitive nature, but I managed to retrieve the following key callback result provided by LiqPay:
[HTTP_SERVICE_RES <<>> 200 5129ms] {“error”:“{error,{failed_connect,[{to_address,{"*",443}},\n {inet,[inet],timeout}]}}”,“code”:0}"**
From this, it’s clear that their server is unable to send requests to my site over port 443 (SSL). What’s odd is the error code 0, which I’ve never encountered before. After running various diagnostics and checking logs, I confirmed that Cloudflare doesn’t log any such request — meaning it never even reaches their edge servers.
Despite this, their support kept insisting that I should allowlist their IP addresses. But this was already done from the very beginning of the integration — they simply responded with generic copy-paste replies.
Here’s a bit more technical detail about how they send requests:
TLS 1.2 with cipher suites:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
I also tested incoming requests from another remote server: they work fine if I add the IP to the allowlist. Otherwise, I at least see a log entry showing the request was blocked. However, in LiqPay’s case — there’s no log at all.
After multiple back-and-forth messages where they blamed Cloudflare or claimed my config was wrong, I finally gave up and set up a reverse proxy through another server I control. I can’t risk exposing my primary IP due to compliance and security concerns, and unfortunately, the payment provider refuses to take responsibility or escalate the issue. They also did not allow me to send a detailed technical report to their engineering team, which could have helped identify the root cause.
Regarding potential ISP-level blocking — I understand your concern, and in my region, due to the ongoing war, strong network-level protections are a necessity. Cyberattacks of various kinds remain a serious issue and occur frequently, even with strict firewall rules and filters in place. However, this does not affect LiqPay’s callback servers, as they are hosted on Amazon infrastructure in countries where there are no such restrictions or blocks in place. Therefore, local ISP or country-level blocking is clearly not the cause of the callback delivery failure.
As for why LiqPay seems uninterested in fixing the issue — I believe one possible reason is their organizational structure. Since PrivatBank was nationalized, and LiqPay is its subsidiary, this may have further impacted their responsiveness. However, it’s worth noting that even before nationalization, LiqPay was known for poor customer orientation and lack of initiative in solving user-side issues. Unfortunately, arguments about the importance of resolving compatibility problems with the world’s most popular website protection service seem to fall on deaf ears.