Skip to content

Commit 3029a01

Browse files
Merge pull request #297606 from asudbring/us417294-vnet-top-freshness
IP address 168 article freshness review and update
2 parents 7dec81e + 0297c86 commit 3029a01

File tree

1 file changed

+24
-15
lines changed

1 file changed

+24
-15
lines changed

articles/virtual-network/what-is-ip-address-168-63-129-16.md

Lines changed: 24 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about IP address 168.63.129.16, specifically that it's used t
44
author: asudbring
55
ms.service: azure-virtual-network
66
ms.topic: concept-article
7-
ms.date: 03/30/2023
7+
ms.date: 03/31/2025
88
ms.author: allensu
99
---
1010

@@ -22,9 +22,6 @@ IP address 168.63.129.16 is a virtual public IP address that is used to facilita
2222

2323
- Enables Guest Agent heartbeat messages for the PaaS role.
2424

25-
> [!NOTE]
26-
> In a non-virtual network scenario (Classic), a private IP address is used instead of 168.63.129.16. This private IP address is dynamically discovered through DHCP. Firewall rules specific to 168.63.129.16 need to be adjusted as appropriate.
27-
2825
## Scope of IP address 168.63.129.16
2926

3027
The public IP address 168.63.129.16 is used in all regions and all national clouds. Microsoft owns this special public IP address and it doesn't change. We recommend that you allow this IP address in any local (in the VM) firewall policies (outbound direction). The communication between this special IP address and the resources is safe because only the internal Azure platform can source a message from this IP address. If this address is blocked, unexpected behavior can occur in various scenarios. 168.63.129.16 is a [virtual IP of the host node](./network-security-groups-overview.md#azure-platform-considerations) and as such it isn't subject to user defined routes.
@@ -35,28 +32,38 @@ The public IP address 168.63.129.16 is used in all regions and all national clou
3532

3633
By default DNS communication isn't subject to the configured network security groups unless targeted using the [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags) service tag. To block DNS traffic to Azure DNS through NSG, create an outbound rule to deny traffic to [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags). Specify **"Any"** as **"Source"**, **"*"** as **"Destination port ranges"**, **"Any"** as protocol and **"Deny"** as action.
3734

38-
Additionally, the IP address 168.63.129.16 does not support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, you won't receive any FQDN.
35+
Additionally, the IP address 168.63.129.16 doesn't support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, an FQDN isn't received.
3936

4037
- When the VM is part of a load balancer backend pool, [health probe](../load-balancer/load-balancer-custom-probe-overview.md) communication should be allowed to originate from 168.63.129.16. The default network security group configuration has a rule that allows this communication. This rule uses the [AzureLoadBalancer](../virtual-network/service-tags-overview.md#available-service-tags) service tag. If desired, this traffic can be blocked by configuring the network security group. The configuration of the block result in probes that fail.
4138

4239
## Troubleshoot connectivity
4340

4441
> [!NOTE]
45-
> When running the following tests, the action must be run as Administrator (Windows) and Root (Linux) to ensure accurate results.
42+
> Execution of the following tests must be run as Administrator (Windows) and Root (Linux) to ensure accurate results.
4643
47-
### Windows OS
44+
### [Windows](#tab/windows)
4845

4946
You can test communication to 168.63.129.16 by using the following tests with PowerShell.
5047

5148
```powershell
52-
Test-NetConnection -ComputerName 168.63.129.16 -Port 80
53-
Test-NetConnection -ComputerName 168.63.129.16 -Port 32526
54-
Invoke-RestMethod -Headers @{"Metadata"="true"} -Method GET -Uri http://168.63.129.16/?comp=versions
49+
$Params = @{
50+
ComputerName = "168.63.129.16"
51+
Port = 80
52+
}
53+
Test-NetConnection @Params
54+
55+
$Params.Port = 32526
56+
Test-NetConnection @Params
57+
58+
$Headers = @{
59+
Metadata = "true"
60+
}
61+
Invoke-RestMethod -Headers $Headers -Method GET -Uri "http://168.63.129.16/?comp=versions"
5562
```
5663

5764
Results should return as follows.
5865

59-
```powershell
66+
```output
6067
Test-NetConnection -ComputerName 168.63.129.16 -Port 80
6168
ComputerName : 168.63.129.16
6269
RemoteAddress : 168.63.129.16
@@ -66,7 +73,7 @@ SourceAddress : 10.0.0.4
6673
TcpTestSucceeded : True
6774
```
6875

69-
```powershell
76+
```output
7077
Test-NetConnection -ComputerName 168.63.129.16 -Port 32526
7178
ComputerName : 168.63.129.16
7279
RemoteAddress : 168.63.129.16
@@ -76,7 +83,7 @@ SourceAddress : 10.0.0.4
7683
TcpTestSucceeded : True
7784
```
7885

79-
```powershell
86+
```output
8087
Invoke-RestMethod -Headers @{"Metadata"="true"} -Method GET -Uri http://168.63.129.16/?comp=versions
8188
xml Versions
8289
--- --------
@@ -97,7 +104,7 @@ Psping 168.63.129.16:80 >> C:\<<EDIT-DIRECTORY>>\168-63-129-16_test--port80.txt
97104
Psping 168.63.129.16:32526 >> C:\<<EDIT-DIRECTORY>>\168-63-129-16_test-port32526.txt
98105
```
99106

100-
### Linux OS
107+
### [Linux](#tab/linux)
101108

102109
On Linux, you can test communication to 168.63.129.16 by using the following tests.
103110

@@ -112,7 +119,7 @@ curl http://168.63.129.16/?comp=versions >> 168-63-129-16_test.txt
112119

113120
Results inside 168-63-129-16_test.txt should return as follows.
114121

115-
```bash
122+
```output
116123
traceroute -T -p 80 168.63.129.16
117124
traceroute to 168.63.129.16 (168.63.129.16), 30 hops max, 60 byte packets
118125
1 168.63.129.16 (168.63.129.16) 0.974 ms 1.085 ms 1.078 ms
@@ -141,6 +148,8 @@ curl http://168.63.129.16/?comp=versions
141148
</Supported>
142149
```
143150

151+
---
152+
144153
## Next steps
145154

146155
- [Security groups](./network-security-groups-overview.md)

0 commit comments

Comments
 (0)