Locations and IPs.
Here is the list of our IPs so you can allow-list them if needed.
Home / Help Center / Locations
Download all IPs for allow-listing in .txt format.
IMPORTANT: On April 8th we updated our core monitoring infrastructure, adding these new IPs:
2406:da14:94d:8601:9d0d:7754:bedf:e4f5
2406:da14:94d:8601:b325:ff58:2bba:7934
2406:da14:94d:8601:db4b:c5ac:2cbe:9a79
2406:da18:caa:9000:44d1:a872:1437:260c
2406:da1c:9c8:dc02:7ae1:f2ea:ab91:2fde
2406:da1c:9c8:dc02:7db9:f38b:7b9f:402e
2406:da1c:9c8:dc02:82b2:f0fd:ee96:0579
We have optimized our IPv6 addressing format by removing the /64
subnet prefix, ensuring compatibility with CloudFlare and other network security configurations.
We removed the IPs that were no longer in use.
UptimeRobot uses a distributed monitoring system to minimize false-positives.
All initial checks are performed from the same region using randomly selected servers (IPs). When an issue is detected, we verify the downtime by conducting additional checks from different servers within the same region.
Allow-listing.
If the monitoring works well for you, there is no need to take any action. However, if you receive any false positives, there is a strong chance that the IPs used are blocked by your hosting provider. Learn more about all the reasons for monitor downtime in detail.
Please make sure that you allow-list these IPs so that any requests that UptimeRobot send are not blocked.
Locations and IPs.
IPv4.
North America.
69.162.124.224/28
216.144.248.16/28
216.245.221.80/28
3.212.128.62
34.198.201.66
52.22.236.30
54.167.223.174
3.12.251.153
3.20.63.178
18.116.205.62
52.15.147.27
35.84.118.171
35.166.228.98
44.227.38.253
104.131.107.63
165.227.83.148
138.197.150.151
159.203.30.41
5.161.61.238
5.161.75.7
5.78.87.38
5.78.118.142
Europe.
146.185.143.14
167.99.209.234
46.101.250.135
159.89.8.111
139.59.173.249
178.62.52.237
49.13.24.81
49.13.130.29
49.13.134.145
78.47.98.55
88.99.80.227
142.132.180.39
157.90.155.240
157.90.156.63
168.119.53.160
168.119.96.239
49.13.164.148
49.13.167.123
78.46.190.63
78.46.215.1
78.47.173.76
128.140.41.193
128.140.106.114
159.69.158.189
168.119.123.75
167.235.143.113
37.27.28.153
37.27.29.68
37.27.30.213
37.27.34.49
37.27.82.220
37.27.87.149
65.109.8.202
65.109.129.165
65.109.142.78
135.181.154.9
Asia.
18.180.208.214
54.64.67.106
54.249.170.27
122.248.234.23
128.199.195.156
Australia.
3.105.133.239
3.105.190.221
54.79.28.129
IPv6.
North America.
2607:ff68:107::0/121
2600:1f18:179:f900:4696:7729:7bb3:f52f
2600:1f18:179:f900:4b7d:d1cc:2d10:211
2600:1f18:179:f900:5c68:91b6:5d75:5d7
2600:1f18:179:f900:71:af9a:ade7:d772
2600:1f16:775:3a00:37bf:6026:e54a:f03a
2600:1f16:775:3a00:8c2c:2ba6:778f:5be5
2600:1f16:775:3a00:ac3:c5eb:7081:942e
2600:1f16:775:3a00:dbbe:36b0:3c45:da32
2600:1f14:203:e40d:c86b:1e24:fab4:7d03
2600:1f14:203:e46c:6c8c:bcb:5245:7a0c
2600:1f14:203:e48b:5538:77b2:6e13:4f8d
2604:a880:400:d0::4f:3001
2604:a880:800:10::4e6:f001
2604:a880:cad:d0::18:f001
2604:a880:cad:d0::122:7001
2a01:4ff:f0:b2f2::1
2a01:4ff:f0:e9cf::1
2a01:4ff:1f0:9092::1
2a01:4ff:1f0:e821::1
Europe.
2a03:b0c0:0:1010::2b:b001
2a03:b0c0:2:d0::fa3:e001
2a03:b0c0:3:d0::33e:4001
2a03:b0c0:3:d0::44:f001
2a03:b0c0:1:d0::22:5001
2a03:b0c0:1:d0::e54:a001
2a01:4f8:c012:c60e::1
2a01:4f8:c013:34c0::1
2a01:4f8:c013:3b0f::1
2a01:4f8:c013:3c52::1
2a01:4f8:c013:3c53::1
2a01:4f8:c013:3c54::1
2a01:4f8:c013:3c55::1
2a01:4f8:c013:3c56::1
2a01:4f8:c013:c18::1
2a01:4f8:c17:42e4::1
2a01:4f8:1c1c:7240::1
2a01:4f8:1c1b:4ef4::1
2a01:4f8:c2c:9fc6::1
2a01:4f8:1c1b:5b5a::1
2a01:4f8:c0c:83fa::1
2a01:4f8:1c1c:5353::1
2a01:4f8:c2c:beae::1
2a01:4f8:1c1c:11aa::1
2a01:4f8:1c1b:7ecc::1
2a01:4f8:1c1c:a98a::1
2a01:4f9:c010:a254::1
2a01:4f9:c010:b473::1
2a01:4f9:c010:dc03::1
2a01:4f9:c010:e70b::1
2a01:4f9:c012:592a::1
2a01:4f9:c012:97c5::1
2a01:4f9:c012:a544::1
2a01:4f9:c012:a954::1
2a01:4f9:c012:b246::1
2a01:4f9:c012:d5a6::1
Asia.
2406:da14:94d:8601:9d0d:7754:bedf:e4f5
2406:da14:94d:8601:b325:ff58:2bba:7934
2406:da14:94d:8601:db4b:c5ac:2cbe:9a79
2406:da18:caa:9000:44d1:a872:1437:260c
2400:6180:0:d0::16:d001
Australia.
2406:da1c:9c8:dc02:7ae1:f2ea:ab91:2fde
2406:da1c:9c8:dc02:7db9:f38b:7b9f:402e
2406:da1c:9c8:dc02:82b2:f0fd:ee96:0579
Tips for adding our monitoring IPs to your firewall.
1. Windows Defender Firewall
- How to Add an IP Address to the Allow List:
- Open Windows Defender Firewall with Advanced Security.
- Click on Inbound Rules New Rule.
- Select Custom for the Rule Type and click Next.
- In the Scope tab, under Remote IP address, select These IP addresses and click Add.
- Enter our monitoring IP addresses and click OK.
- Complete the wizard to create the rule.
Official Documentation:
- How to Allow an IP Address:
- Open your terminal.
- Run the following command for each IP address:
sudo iptables -A INPUT -s [IP_ADDRESS] -j ACCEPT
- Save the iptables configuration to ensure changes persist after reboot.
Official Documentation:
- How to Allow an IP Address:
- Open your terminal.
- Run the command:
sudo ufw allow from [IP_ADDRESS]
- Reload UFW to apply changes:
sudo ufw reload
Official Documentation:
- How to Create an Access Rule:
- Log in to the Cisco ASDM or CLI.
- Navigate to Configuration > Firewall > Access Rules.
- Add a new rule permitting traffic from our monitoring IPs to your server.
- Apply and save the configuration.
Official Documentation:
- How to Create a Security Policy Rule:
- Log in to the Palo Alto Networks web interface.
- Go to Policies > Security.
- Click Add to create a new rule.
- In the Source tab, add our monitoring IPs.
- Define the necessary parameters and click OK.
- Commit the changes.
Official Documentation:
- How to Add an Address and Policy:
- Log in to the FortiGate web interface.
- Go to Policy & Objects > Addresses and create a new address for our IPs.
- Navigate to Firewall Policy and create a new policy allowing traffic from the new address to your internal network.
- Move the policy to the correct sequence and save.
Official Documentation:
- How to Add an Access Rule:
- Open SmartConsole and connect to your management server.
- Go to Security Policies.
- Add a new rule allowing traffic from our monitoring IPs to your resources.
- Install the policy to apply changes.
Official Documentation:
- How to Create a Firewall Access Rule:
- Log in to the SonicWall web interface.
- Navigate to Rules > Access Rules.
- Click Add to create a new rule allowing our monitoring IPs.
- Configure the necessary settings and save.
Official Documentation: