Skip to content

Commit e90d806

Browse files
mazgiasudbring
andauthored
Update articles/virtual-network/what-is-ip-address-168-63-129-16.md
Co-authored-by: Allen Sudbring <[email protected]>
1 parent b627d85 commit e90d806

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/virtual-network/what-is-ip-address-168-63-129-16.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The public IP address 168.63.129.16 is used in all regions and all national clou
3535

3636
By default DNS communication isn't subject to the configured network security groups unless targeted using the [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags) service tag. To block DNS traffic to Azure DNS through NSG, create an outbound rule to deny traffic to [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags). Specify **"Any"** as **"Source"**, **"*"** as **"Destination port ranges"**, **"Any"** as protocol and **"Deny"** as action.
3737

38-
In addition, 168.63.129.16 isn't resolved by reverse DNS lookup, which means that you cannot get any FQDN if you would want to get the FQDN using reverse lookup commands such as `host`, `nslookup`, or `dig -x` with 168.63.129.16.
38+
Additionally, the IP address 168.63.129.16 does not support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, you won't receive any FQDN.
3939

4040
- When the VM is part of a load balancer backend pool, [health probe](../load-balancer/load-balancer-custom-probe-overview.md) communication should be allowed to originate from 168.63.129.16. The default network security group configuration has a rule that allows this communication. This rule uses the [AzureLoadBalancer](../virtual-network/service-tags-overview.md#available-service-tags) service tag. If desired, this traffic can be blocked by configuring the network security group. The configuration of the block result in probes that fail.
4141

0 commit comments

Comments
 (0)