IP addresses used by Azure Monitor
If your monitored application or infrastructure is behind a firewall, you need to configure network access to allow communication with Azure Monitor services.
Azure Monitor uses service tags, which provide a more reliable and dynamic way to manage network access. Service tags are regularly updated and can be retrieved through an API, ensuring that you have the latest available IP address information without requiring manual updates.
If you're using Azure network security groups, you can manage access with Azure network service tags. For hybrid or on-premises resources, you can download the equivalent IP address lists as JSON files, which are refreshed weekly. To cover all necessary exceptions, use the service tags ActionGroup
, ApplicationInsightsAvailability
, and AzureMonitor
. For more information, see Azure Service Tags Overview.
Note
- All Application Insights traffic represents outbound traffic except for availability monitoring and webhook action groups, which also require inbound firewall rules.
- Service tags don't replace validation/authentication checks required for cross-tenant communications between a customer's Azure resource and other service tag resources.
Outgoing ports
You need to open some outgoing ports in your server's firewall to allow the Application Insights SDK or Application Insights Agent to send data to the portal.
Note
These addresses are listed by using Classless Interdomain Routing notation. As an example, an entry like 51.144.56.112/28
is equivalent to 16 IPs that start at 51.144.56.112
and end at 51.144.56.127
.
Purpose | URL | Type | Ports |
---|---|---|---|
Telemetry | dc.applicationinsights.azure.com dc.applicationinsights.microsoft.com dc.services.visualstudio.com {region}.in.applicationinsights.azure.com |
Global Global Global Regional |
443 |
Live Metrics | live.applicationinsights.azure.com rt.applicationinsights.microsoft.com rt.services.visualstudio.com {region}.livediagnostics.monitor.azure.com Example for {region} : westus2 |
Global Global Global Regional |
443 |
Note
Application Insights ingestion endpoints are IPv4 only.
Azure Government uses the top-level domain
.us
instead of.com
. Compare Azure Public and Azure Government endpoints for common Azure services.
Application Insights Agent
Application Insights Agent configuration is needed only when you're making changes.
Purpose | URL | Ports |
---|---|---|
Configuration | management.core.windows.net |
443 |
Configuration | management.azure.com |
443 |
Configuration | login.windows.net |
443 |
Configuration | login.microsoftonline.com |
443 |
Configuration | secure.aadcdn.microsoftonline-p.com |
443 |
Configuration | auth.gfx.ms |
443 |
Configuration | login.live.com |
443 |
Installation | globalcdn.nuget.org , packages.nuget.org ,api.nuget.org/v3/index.json nuget.org , api.nuget.org , dc.services.vsallin.net |
443 |
Availability tests
For more information on availability tests, see Private availability testing.
Application Insights and Log Analytics APIs
Purpose | URI | Ports |
---|---|---|
API | api.applicationinsights.io api1.applicationinsights.io api2.applicationinsights.io api3.applicationinsights.io api4.applicationinsights.io api5.applicationinsights.io dev.applicationinsights.io dev.applicationinsights.microsoft.com dev.aisvc.visualstudio.com www.applicationinsights.io www.applicationinsights.microsoft.com www.aisvc.visualstudio.com api.loganalytics.io *.api.loganalytics.io dev.loganalytics.io docs.loganalytics.io www.loganalytics.io api.loganalytics.azure.com |
80,443 |
Azure Pipeline annotations extension | aigs1.aisvc.visualstudio.com |
443 |
Application Insights analytics
Purpose | URI | Ports |
---|---|---|
CDN (Content Delivery Network) | applicationanalytics.azureedge.net |
80,443 |
Media CDN | applicationanalyticsmedia.azureedge.net |
80,443 |
The Application Insights team owns the *.applicationinsights.io domain.
Log Analytics portal
Purpose | URI | Ports |
---|---|---|
Portal | portal.loganalytics.io |
80,443 |
The Log Analytics team owns the *.loganalytics.io domain.
Application Insights Azure portal extension
Purpose | URI | Ports |
---|---|---|
Application Insights extension | stamp2.app.insightsportal.visualstudio.com |
80,443 |
Application Insights extension CDN | insightsportal-prod2-cdn.aisvc.visualstudio.com insightsportal-prod2-asiae-cdn.aisvc.visualstudio.com insightsportal-cdn-aimon.applicationinsights.io |
80,443 |
Application Insights SDKs (Software Development Kits)
Purpose | URI | Ports |
---|---|---|
Application Insights JS SDK CDN | az416426.vo.msecnd.net js.monitor.azure.com |
80,443 |
Action group webhooks
You can query the list of IP addresses used by action groups by using the Get-AzNetworkServiceTag PowerShell command.
Action group service tag
Managing changes to source IP addresses can be time consuming. Using service tags eliminates the need to update your configuration. A service tag represents a group of IP address prefixes from a specific Azure service. Microsoft manages the IP addresses and automatically updates the service tag as addresses change, which eliminates the need to update network security rules for an action group.
In the Azure portal under Azure Services, search for Network Security Group.
Select Add and create a network security group:
- Add the resource group name, and then enter Instance details information.
- Select Review + Create, and then select Create.
Go to Resource Group, and then select the network security group you created:
- Select Inbound security rules.
- Select Add.
A new window opens in the right pane:
- Under Source, enter Service Tag.
- Under Source service tag, enter ActionGroup.
- Select Add.
Application Insights Profiler for .NET
Purpose | URI | Ports |
---|---|---|
Agent | agent.azureserviceprofiler.net *.agent.azureserviceprofiler.net profiler.monitor.azure.com |
443 |
Portal | gateway.azureserviceprofiler.net dataplane.diagnosticservices.azure.com |
443 |
Storage | *.core.windows.net |
443 |
Snapshot Debugger
Note
Application Insights Profiler for .NET and Snapshot Debugger share the same set of IP addresses.
Purpose | URI | Ports |
---|---|---|
Agent | agent.azureserviceprofiler.net *.agent.azureserviceprofiler.net snapshot.monitor.azure.com |
443 |
Portal | gateway.azureserviceprofiler.net dataplane.diagnosticservices.azure.com |
443 |
Storage | *.core.windows.net |
443 |
Frequently asked questions
This section provides answers to common questions.
Can I monitor an intranet web server?
Yes, but you need to allow traffic to our services by either firewall exceptions or proxy redirects.
See IP addresses used by Azure Monitor to review our full list of services and IP addresses.
How do I reroute traffic from my server to a gateway on my intranet?
Route traffic from your server to a gateway on your intranet by overwriting endpoints in your configuration. If the Endpoint
properties aren't present in your config, these classes use the default values which are documented in IP addresses used by Azure Monitor.
Your gateway should route traffic to our endpoint's base address. In your configuration, replace the default values with http://<your.gateway.address>/<relative path>
.
What if my product doesn't support service tags?
If your product doesn't support service tags, take the following steps to ensure full connectivity:
- Check the latest IP ranges in the downloadable Azure IP ranges and service tags JSON file, which updates weekly.
- Review firewall logs for blocked requests and update your allowlist as needed.
For more information, see Azure Service Tags Overview.