You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/what-is-ip-address-168-63-129-16.md
+24-15Lines changed: 24 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about IP address 168.63.129.16, specifically that it's used t
4
4
author: asudbring
5
5
ms.service: azure-virtual-network
6
6
ms.topic: concept-article
7
-
ms.date: 03/30/2023
7
+
ms.date: 03/31/2025
8
8
ms.author: allensu
9
9
---
10
10
@@ -22,9 +22,6 @@ IP address 168.63.129.16 is a virtual public IP address that is used to facilita
22
22
23
23
- Enables Guest Agent heartbeat messages for the PaaS role.
24
24
25
-
> [!NOTE]
26
-
> In a non-virtual network scenario (Classic), a private IP address is used instead of 168.63.129.16. This private IP address is dynamically discovered through DHCP. Firewall rules specific to 168.63.129.16 need to be adjusted as appropriate.
27
-
28
25
## Scope of IP address 168.63.129.16
29
26
30
27
The public IP address 168.63.129.16 is used in all regions and all national clouds. Microsoft owns this special public IP address and it doesn't change. We recommend that you allow this IP address in any local (in the VM) firewall policies (outbound direction). The communication between this special IP address and the resources is safe because only the internal Azure platform can source a message from this IP address. If this address is blocked, unexpected behavior can occur in various scenarios. 168.63.129.16 is a [virtual IP of the host node](./network-security-groups-overview.md#azure-platform-considerations) and as such it isn't subject to user defined routes.
@@ -35,28 +32,38 @@ The public IP address 168.63.129.16 is used in all regions and all national clou
35
32
36
33
By default DNS communication isn't subject to the configured network security groups unless targeted using the [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags) service tag. To block DNS traffic to Azure DNS through NSG, create an outbound rule to deny traffic to [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags). Specify **"Any"** as **"Source"**, **"*"** as **"Destination port ranges"**, **"Any"** as protocol and **"Deny"** as action.
37
34
38
-
Additionally, the IP address 168.63.129.16 does not support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, you won't receive any FQDN.
35
+
Additionally, the IP address 168.63.129.16 doesn't support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, an FQDN isn't received.
39
36
40
37
- When the VM is part of a load balancer backend pool, [health probe](../load-balancer/load-balancer-custom-probe-overview.md) communication should be allowed to originate from 168.63.129.16. The default network security group configuration has a rule that allows this communication. This rule uses the [AzureLoadBalancer](../virtual-network/service-tags-overview.md#available-service-tags) service tag. If desired, this traffic can be blocked by configuring the network security group. The configuration of the block result in probes that fail.
41
38
42
39
## Troubleshoot connectivity
43
40
44
41
> [!NOTE]
45
-
> When running the following tests, the action must be run as Administrator (Windows) and Root (Linux) to ensure accurate results.
42
+
> Execution of the following tests must be run as Administrator (Windows) and Root (Linux) to ensure accurate results.
46
43
47
-
### Windows OS
44
+
### [Windows](#tab/windows)
48
45
49
46
You can test communication to 168.63.129.16 by using the following tests with PowerShell.
0 commit comments