Locations and IPs.
Here is the list of our IPs so you can allow-list them if needed.
Home / Help Center / Locations
Download all IPs for allow-listing in .txt, JSON or directly from DNS
IMPORTANT: We’ve updated our monitoring infrastructure and are rolling out new IP addresses. Starting July 28th, UptimeRobot will begin using the new IPs listed below in production, replacing the old ones.
If you’re using a firewall, you must update your rules and whitelist the new IPs to ensure uninterrupted monitoring.
To make this easier, we’ve released a dedicated API that always returns the latest list of UptimeRobot monitoring IPs. Click on “JSON” to access it.
UptimeRobot uses a distributed monitoring system to minimize false-positives.
All initial checks are performed from the same region using randomly selected servers (IPs). When an issue is detected, we verify the downtime by conducting additional checks from different servers and providers within the same region.
Allow-listing.
If the monitoring works well for you, there is no need to take any action. However, if you receive any false positives, there is a strong chance that the IPs used are blocked by your hosting provider. Learn more about all the reasons for monitor downtime in detail.
Please make sure that you allow-list these IPs so that any requests that UptimeRobot send are not blocked.
Locations and IPs.
IPv4.
North America.
3.212.128.62
34.198.201.66
52.22.236.30
54.167.223.174
52.87.72.16
54.87.112.51
3.20.63.178
52.15.147.27
3.12.251.153
18.116.205.62
3.133.226.214
3.149.57.90
45.55.123.175
45.55.127.146
129.212.132.140
134.199.240.137
138.197.53.117
138.197.53.138
138.197.54.143
138.197.54.247
138.197.63.92
143.244.221.177
144.126.251.21
209.38.49.1
209.38.49.206
209.38.49.226
209.38.51.43
5.161.75.7
5.161.73.160
5.161.113.195
5.161.117.52
5.161.177.47
5.161.194.92
5.161.215.244
178.156.181.172
178.156.184.20
178.156.185.127
178.156.185.231
178.156.187.238
178.156.189.113
178.156.189.249
69.162.124.227
69.162.124.235
69.162.124.238
216.144.248.18
216.144.248.19
216.144.248.21
216.144.248.22
216.144.248.23
216.144.248.24
216.144.248.25
216.144.248.26
216.144.248.27
216.144.248.28
216.144.248.29
216.144.248.30
216.245.221.83
Europe.
3.77.67.4
3.79.134.69
18.192.166.72
18.193.252.127
52.28.162.93
52.59.43.236
63.178.84.147
24.144.78.39
24.144.78.185
64.225.81.248
64.225.82.147
143.198.249.237
143.198.250.89
143.244.196.21
143.244.196.211
152.42.149.135
159.223.243.219
161.35.247.201
167.99.18.52
188.166.201.79
206.189.241.133
209.38.53.7
49.13.24.81
49.13.130.29
49.13.134.145
78.47.98.55
88.99.80.227
142.132.180.39
157.90.155.240
157.90.156.63
168.119.53.160
168.119.96.239
49.13.164.148
49.13.167.123
78.46.190.63
78.47.173.76
128.140.41.193
128.140.106.114
159.69.158.189
167.235.143.113
168.119.123.75
78.46.215.1
91.99.101.207
Asia.
18.180.208.214
54.64.67.106
54.249.170.27
139.59.50.44
146.190.9.187
209.38.124.252
5.223.43.32
5.223.53.147
5.223.57.22
Australia.
3.105.133.239
3.105.190.221
54.79.28.129
170.64.250.64
170.64.250.132
170.64.250.235
IPv6.
North America.
2600:1f18:179:f900:4b7d:d1cc:2d10:211
2600:1f18:179:f900:4696:7729:7bb3:f52f
2600:1f18:179:f900:5c68:91b6:5d75:5d7
2600:1f18:179:f900:71:af9a:ade7:d772
2600:1f18:179:f900:2406:9399:4ae6:c5d3
2600:1f18:179:f900:e8dd:eed1:a6c:183b
2600:1f16:775:3a00:8c2c:2ba6:778f:5be5
2600:1f16:775:3a00:dbbe:36b0:3c45:da32
2600:1f16:775:3a00:37bf:6026:e54a:f03a
2600:1f16:775:3a00:ac3:c5eb:7081:942e
2600:1f16:775:3a00:3f24:5bb0:95d7:5a6b
2600:1f16:775:3a00:91ac:3120:ff38:92b5
2604:a880:800:14:0:1:68ba:d000
2604:a880:800:14:0:1:68ba:e000
2604:a880:800:14:0:1:68bb:0
2604:a880:800:14:0:1:68bb:1000
2604:a880:800:14:0:1:68bb:3000
2604:a880:800:14:0:1:68bb:4000
2604:a880:800:14:0:1:68bb:5000
2604:a880:800:14:0:1:68bb:6000
2604:a880:800:14:0:1:68bb:7000
2604:a880:800:14:0:1:68bb:a000
2604:a880:800:14:0:1:68bb:b000
2604:a880:800:14:0:1:68bb:c000
2604:a880:800:14:0:1:68bb:d000
2604:a880:800:14:0:1:68bb:e000
2604:a880:800:14:0:1:68bb:f000
2a01:4ff:f0:b2f2::1
2a01:4ff:f0:e9cf::1
2a01:4ff:f0:3e03::1
2a01:4ff:f0:5f80::1
2a01:4ff:f0:7fad::1
2a01:4ff:f0:9c5f::1
2a01:4ff:f0:2219::1
2a01:4ff:f0:b6f1::1
2a01:4ff:f0:bfd::1
2a01:4ff:f0:d3cd::1
2a01:4ff:f0:d283::1
2a01:4ff:f0:e516::1
2a01:4ff:f0:eccb::1
2a01:4ff:f0:efd1::1
2a01:4ff:f0:fdc7::1
2607:ff68:107::4
2607:ff68:107::14
2607:ff68:107::33
2607:ff68:107::48
2607:ff68:107::49
2607:ff68:107::50
2607:ff68:107::51
2607:ff68:107::52
2607:ff68:107::53
2607:ff68:107::54
2607:ff68:107::55
2607:ff68:107::56
2607:ff68:107::57
2607:ff68:107::58
2607:ff68:107::59
2607:ff68:107::60
Europe.
2a05:d014:1815:3400:6d:9235:c1c0:96ad
2a05:d014:1815:3400:90b4:4ef9:5631:b170
2a05:d014:1815:3400:654f:bd37:724c:212b
2a05:d014:1815:3400:9779:d8e9:100a:9642
2a05:d014:1815:3400:af29:e95e:64ff:df81
2a05:d014:1815:3400:c7d6:f7f3:6cc1:30d1
2a05:d014:1815:3400:d784:e5dd:8e0:67cb
2a03:b0c0:2:f0::bd91:f001
2a03:b0c0:2:f0::bd92:1
2a03:b0c0:2:f0::bd92:1001
2a03:b0c0:2:f0::bd92:2001
2a03:b0c0:2:f0::bd92:4001
2a03:b0c0:2:f0::bd92:5001
2a03:b0c0:2:f0::bd92:6001
2a03:b0c0:2:f0::bd92:7001
2a03:b0c0:2:f0::bd92:8001
2a03:b0c0:2:f0::bd92:9001
2a03:b0c0:2:f0::bd92:a001
2a03:b0c0:2:f0::bd92:b001
2a03:b0c0:2:f0::bd92:c001
2a03:b0c0:2:f0::bd92:e001
2a03:b0c0:2:f0::bd92:f001
2a01:4f8:c012:c60e::1
2a01:4f8:c013:3b0f::1
2a01:4f8:c013:3c52::1
2a01:4f8:c013:3c53::1
2a01:4f8:c013:3c54::1
2a01:4f8:c013:3c55::1
2a01:4f8:c013:3c56::1
2a01:4f8:c013:34c0::1
2a01:4f8:c013:c18::1
2a01:4f8:c17:42e4::1
2a01:4f8:1c1b:4ef4::1
2a01:4f8:1c1b:5b5a::1
2a01:4f8:1c1b:7ecc::1
2a01:4f8:1c1c:5353::1
2a01:4f8:1c1c:7240::1
2a01:4f8:1c1c:a98a::1
2a01:4f8:c0c:83fa::1
2a01:4f8:c2c:9fc6::1
2a01:4f8:c2c:beae::1
2a01:4f8:1c1c:11aa::1
2a01:4f8:1c1a:3d53::1
Asia.
2406:da14:94d:8601:9d0d:7754:bedf:e4f5
2406:da14:94d:8601:b325:ff58:2bba:7934
2406:da14:94d:8601:db4b:c5ac:2cbe:9a79
2400:6180:100:d0::94b6:4001
2400:6180:100:d0::94b6:5001
2400:6180:100:d0::94b6:7001
2a01:4ff:2f0:3b3a::1
2a01:4ff:2f0:27de::1
2a01:4ff:2f0:193c::1
Australia.
2406:da1c:9c8:dc02:7ae1:f2ea:ab91:2fde
2406:da1c:9c8:dc02:7db9:f38b:7b9f:402e
2406:da1c:9c8:dc02:82b2:f0fd:ee96:579
2400:6180:10:200::56a0:b000
2400:6180:10:200::56a0:c000
2400:6180:10:200::56a0:e000
Tips for adding our monitoring IPs to your firewall.
1. Windows Defender Firewall
- How to Add an IP Address to the Allow List:
- Open Windows Defender Firewall with Advanced Security.
- Click on Inbound Rules New Rule.
- Select Custom for the Rule Type and click Next.
- In the Scope tab, under Remote IP address, select These IP addresses and click Add.
- Enter our monitoring IP addresses and click OK.
- Complete the wizard to create the rule.
Official Documentation:
- How to Allow an IP Address:
- Open your terminal.
- Run the following command for each IP address:
sudo iptables -A INPUT -s [IP_ADDRESS] -j ACCEPT
- Save the iptables configuration to ensure changes persist after reboot.
Official Documentation:
- How to Allow an IP Address:
- Open your terminal.
- Run the command:
sudo ufw allow from [IP_ADDRESS]
- Reload UFW to apply changes:
sudo ufw reload
Official Documentation:
- How to Create an Access Rule:
- Log in to the Cisco ASDM or CLI.
- Navigate to Configuration > Firewall > Access Rules.
- Add a new rule permitting traffic from our monitoring IPs to your server.
- Apply and save the configuration.
Official Documentation:
- How to Create a Security Policy Rule:
- Log in to the Palo Alto Networks web interface.
- Go to Policies > Security.
- Click Add to create a new rule.
- In the Source tab, add our monitoring IPs.
- Define the necessary parameters and click OK.
- Commit the changes.
Official Documentation:
- How to Add an Address and Policy:
- Log in to the FortiGate web interface.
- Go to Policy & Objects > Addresses and create a new address for our IPs.
- Navigate to Firewall Policy and create a new policy allowing traffic from the new address to your internal network.
- Move the policy to the correct sequence and save.
Official Documentation:
- How to Add an Access Rule:
- Open SmartConsole and connect to your management server.
- Go to Security Policies.
- Add a new rule allowing traffic from our monitoring IPs to your resources.
- Install the policy to apply changes.
Official Documentation:
- How to Create a Firewall Access Rule:
- Log in to the SonicWall web interface.
- Navigate to Rules > Access Rules.
- Click Add to create a new rule allowing our monitoring IPs.
- Configure the necessary settings and save.
Official Documentation: