Skip to content

Daily-updated IP ranges for 20+ providers (AWS, Azure, GCP, Cloudflare, GitHub, Fastly, Linode + GoogleBot, BingBot, GPTBot) in 12+ formats: TXT, JSON, CSV, SQL, Nginx, Apache, iptables, nftables, UFW, HAProxy, Caddy + merged CIDRs

License

Notifications You must be signed in to change notification settings

rezmoss/cloud-provider-ip-addresses

Repository files navigation

Cloud Provider IP Addresses

The most comprehensive, daily-updated collection of IP ranges from cloud providers, CDNs, and web crawlers — in 12+ output formats.

GitHub stars GitHub license Last Updated Providers Formats Update

22 providers | 12+ output formats | Merged/optimized CIDRs | Firewall-ready configs | Unified cross-provider dataset | Daily changelog | IP lookup tool

Live Stats

Last updated: 2026-02-15 | Providers: 22 | Total CIDRs: 419,349 | IPv4 addresses: 333,527,874 | IPv4 space: 7.77%

Provider IPv4 CIDRs IPv6 CIDRs Total CIDRs IPv4 Addresses Services Regions
amazonbot 2,053 0 2,053 2,053 3 0
apple_private_relay 41,660 245,176 286,836 105,638 0 1222
applebot 12 0 12 2,400 1 0
atlassian 194 59 253 78,646 11 18
aws 9,815 4,953 14,768 180,175,161 26 42
azure 74,090 25,568 99,658 99,729,874 3128 73
bingbot 28 0 28 4,736 1 0
cloudflare 15 7 22 1,524,736 0 0
commoncrawl 4 1 5 21 1 0
digitalocean 1,053 146 1,199 3,041,664 0 11
duckduckbot 281 0 281 281 1 0
fastly 19 2 21 304,128 0 0
github 4,725 1,160 5,885 25,193,438 11 0
googlebot 165 142 307 4,928 1 0
googlecloud 836 48 884 16,459,392 1 48
gptbot 280 0 280 9,552 3 0
linode 5,132 92 5,224 1,321,728 0 37
oracle 1,042 0 1,042 3,993,226 3 53
perplexitybot 12 0 12 32 2 0
telegram 9 5 14 11,008 0 0
vultr 434 53 487 1,017,344 0 34
zoom 75 3 78 547,888 3 0

Table of Contents


Why This Repo?

There are other cloud IP range repos out there. Here's what makes this one different:

Feature This Repo Others
Cloud providers 10 (AWS, Azure, GCP, Cloudflare, DigitalOcean, Oracle, Fastly, GitHub, Linode, Vultr) + Apple Private Relay, Telegram Varies
Bot/crawler IPs GoogleBot, BingBot, GPTBot/ChatGPT, AppleBot, PerplexityBot, DuckDuckBot, Amazonbot, Common Crawl Rare
SaaS / Collaboration Zoom, Atlassian (Jira, Confluence, Bitbucket, Trello, ...) Very rare
Output formats 12+ (TXT, JSON, CSV, SQL, Nginx, Apache, iptables, nftables, UFW, HAProxy, Caddy, merged CIDRs) Usually 1-3
Merged/optimized CIDRs Per-provider and combined Rare
Unified cross-provider file all_providers.json / .csv with normalized schema Rare
Service/region breakdown Per-service and per-region files for AWS, Azure, GCP, Oracle, GitHub, GPTBot, Apple Private Relay, Vultr, PerplexityBot, Amazonbot, Zoom, Atlassian Some
IP lookup tool lookup.py — "which cloud owns this IP?" Separate projects
Changelog Daily diff tracking (CIDRs added/removed) Rare
Statistics STATS.md + summary.json with IPv4 space coverage Rare
Update frequency Daily at 00:00 UTC Varies
Firewall-ready configs Nginx, Apache, iptables, nftables, UFW, HAProxy, Caddy Usually 0-1

Quick Start

Grab what you need with a single command:

# All AWS IPs (plain text)
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/aws_ips.txt

# Cloudflare IPv4 only
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/cloudflare/cloudflare_ips_v4.txt

# All providers merged into one optimized IPv4 list
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/all_providers/all_providers_merged_v4.txt

# Block GPTBot with iptables
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/gptbot/iptables_gptbot_deny.sh | sudo bash

# AWS Nginx allow config — drop into your server block
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/nginx_aws_allow.conf -o /etc/nginx/conf.d/aws_allow.conf

# Unified dataset (all providers, normalized JSON)
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/all_providers/all_providers.json

# Look up an IP
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/lookup.py -o lookup.py
python3 lookup.py --data-dir . 13.32.0.1

Supported Providers

Cloud Providers

Provider IPs Services Regions Source
AWS IPv4 + IPv6 Per-service (EC2, S3, CloudFront, ...) Per-region AWS public IP ranges
Microsoft Azure IPv4 + IPv6 Per-service (AzureCloud, AppService, ...) Per-region Azure Service Tags
Google Cloud IPv4 + IPv6 Per-service Per-scope GCP public IP ranges
Cloudflare IPv4 + IPv6 Cloudflare published IP list
DigitalOcean IPv4 + IPv6 Per-region DigitalOcean public geofeed
Oracle Cloud IPv4 + IPv6 Per-service (tags) Per-region Oracle Cloud public IP ranges

CDN / Hosting

Provider IPs Services Source
Fastly IPv4 + IPv6 Fastly public IP list
GitHub IPv4 + IPv6 Per-service (actions, pages, copilot, hooks, web, api, ...) GitHub Meta API
Linode (Akamai) IPv4 + IPv6 Linode public geofeed
Apple (iCloud Private Relay) IPv4 + IPv6 Apple published egress ranges
Vultr IPv4 + IPv6 Per-region Vultr public geofeed
Telegram IPv4 + IPv6 Telegram official CIDR list

SaaS / Collaboration

Provider IPs Services Source
Zoom IPv4 + IPv6 Per-service (zoom, zoom-phone, zoom-contact-center, zoom-cdn) Zoom published IP ranges
Atlassian IPv4 + IPv6 Per-product (Jira, Confluence, Bitbucket, Trello, ...) Atlassian published IP ranges

Bots / Crawlers

Bot IPs Services Source
GoogleBot IPv4 + IPv6 googlebot Google published crawler ranges
BingBot IPv4 + IPv6 bingbot Microsoft published crawler ranges
GPTBot / ChatGPT / SearchBot IPv4 Per-service (gptbot, chatgpt-user, searchbot) OpenAI published bot ranges
AppleBot IPv4 applebot Apple published crawler ranges
PerplexityBot IPv4 + IPv6 Per-service (perplexitybot, perplexity-user) Perplexity published bot ranges
DuckDuckBot IPv4 + IPv6 duckduckbot DuckDuckGo published crawler ranges
Amazonbot IPv4 + IPv6 Per-service (amazonbot, amzn-searchbot, amzn-user) Amazon published bot ranges
Common Crawl (CCBot) IPv4 + IPv6 ccbot Common Crawl published bot ranges

Output Formats

Every provider gets all of these formats:

Format Files Description
TXT {provider}_ips.txt, _v4.txt, _v6.txt One CIDR per line
JSON {provider}_ips.json Structured with ip_address, ip_type, service, region
CSV {provider}_ips.csv Tabular format for spreadsheets/databases
SQL {provider}_ips.sql CREATE TABLE + INSERT statements
Nginx nginx_{provider}_allow.conf, _deny.conf allow/deny rules with deny all/allow all
Apache apache_{provider}_allow.conf, _deny.conf Require ip / Deny from directives
iptables iptables_{provider}_allow.sh, _deny.sh Shell scripts with iptables/ip6tables rules
nftables nftables_{provider}_allow.conf, _deny.conf nftables table/chain definitions
UFW ufw_{provider}_allow.sh, _deny.sh ufw allow/deny from commands
HAProxy haproxy_{provider}_allow.conf ACL-compatible IP list
Caddy caddy_{provider}_allow.conf remote_ip matcher block
Merged CIDRs {provider}_ips_merged_v4.txt, _merged_v6.txt Optimized/collapsed CIDR lists

For providers with service/region data (AWS, Azure, GCP, Oracle, GitHub, GPTBot, Apple Private Relay, Vultr, PerplexityBot, Amazonbot, Zoom, Atlassian), all formats are also generated per-service and per-region.


Merged / Optimized CIDRs

Adjacent and overlapping CIDR blocks are collapsed into the smallest possible list using ipaddress.collapse_addresses(). This is ideal for firewall rules where you need the most compact representation.

# AWS optimized IPv4 list
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/aws_ips_merged_v4.txt

# All providers combined into one merged list
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/all_providers/all_providers_merged_v4.txt

Each provider directory contains:

  • {provider}_ips_merged_v4.txt — optimized IPv4 CIDRs
  • {provider}_ips_merged_v6.txt — optimized IPv6 CIDRs
  • {provider}_ips_merged.txt — both combined

Unified Cross-Provider Data

A single normalized dataset across all providers, available in all_providers/:

File Description
all_providers.json All CIDRs with cidr, ip_version, provider, service, region, last_updated
all_providers.csv Same data in CSV
all_providers_ips.txt All CIDRs, one per line
all_providers_merged_v4.txt All providers merged into one optimized IPv4 list
all_providers_merged_v6.txt All providers merged into one optimized IPv6 list
# Query all providers with jq — find all Azure CIDRs in eastus
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/all_providers/all_providers.json \
  | jq '[.[] | select(.provider=="azure" and .region=="eastus")]'

IP Lookup Tool

Find which cloud provider owns any IP address:

# Download the tool and data
git clone https://github.com/rezmoss/cloud-provider-ip-addresses.git
cd cloud-provider-ip-addresses

# Single IP
python3 lookup.py 13.32.0.1
# Output: 13.32.0.1 — AWS (AMAZON, us-east-1) [13.32.0.0/15]

# Multiple IPs
python3 lookup.py 13.32.0.1 104.16.0.1 168.63.129.16

# Batch mode from file
python3 lookup.py --file suspicious_ips.txt

# JSON output
python3 lookup.py --json 8.8.8.8

Changelog & Stats

Daily Changelog

IP range changes are tracked daily in CHANGELOG.md and machine-readable diffs in changes/:

  • CHANGELOG.md — human-readable summary of CIDRs added/removed per provider
  • changes/{date}.json — machine-readable daily diff

Statistics

  • STATS.md — per-provider IPv4/IPv6 CIDR counts, total addresses, services, regions
  • summary.json — machine-readable version with IPv4 space coverage percentage
# Check today's changes
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/CHANGELOG.md

# Get stats as JSON
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/summary.json

Folder Structure

cloud-provider-ip-addresses/
├── aws/
│   ├── aws_ips.txt / _v4.txt / _v6.txt
│   ├── aws_ips.json / .csv / .sql
│   ├── aws_ips_merged_v4.txt / _merged_v6.txt / _merged.txt
│   ├── nginx_aws_allow.conf / _deny.conf
│   ├── apache_aws_allow.conf / _deny.conf
│   ├── iptables_aws_allow.sh / _deny.sh
│   ├── nftables_aws_allow.conf / _deny.conf
│   ├── ufw_aws_allow.sh / _deny.sh
│   ├── haproxy_aws_allow.conf
│   ├── caddy_aws_allow.conf
│   ├── services/
│   │   └── ec2/ s3/ cloudfront/ ...  (all formats per service)
│   └── regions/
│       └── us_east_1/ eu_west_1/ ...  (all formats per region)
├── azure/                (same structure)
├── googlecloud/          (same structure)
├── oracle/               (same structure)
├── cloudflare/           (all formats, no services/regions)
├── digitalocean/         (all formats, no services/regions)
├── fastly/               (all formats)
├── github/               (all formats + services)
├── linode/               (all formats)
├── googlebot/            (all formats)
├── bingbot/              (all formats)
├── gptbot/               (all formats + services)
├── applebot/             (all formats)
├── apple_private_relay/  (all formats + regions)
├── telegram/             (all formats)
├── vultr/                (all formats + regions)
├── perplexitybot/        (all formats + services)
├── duckduckbot/          (all formats)
├── amazonbot/            (all formats + services)
├── commoncrawl/          (all formats)
├── zoom/                 (all formats + services)
├── atlassian/            (all formats + services + regions)
├── all_providers/
│   ├── all_providers.json / .csv
│   ├── all_providers_ips.txt
│   └── all_providers_merged_v4.txt / _merged_v6.txt
├── changes/
│   └── {date}.json       (daily diffs)
├── CHANGELOG.md
├── STATS.md
├── summary.json
├── lookup.py
├── LICENSE
└── README.md

Usage Examples

curl One-Liners

# Get all AWS IPs
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/aws_ips.txt

# Get GitHub Actions IPs only
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/github/services/actions/github_actions_ips.txt

# Get GPTBot IPs to block AI crawlers
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/gptbot/gptbot_ips.txt

# Get optimized Cloudflare list for firewall
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/cloudflare/cloudflare_ips_merged_v4.txt

Nginx

# Download and include
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/nginx_aws_allow.conf \
  -o /etc/nginx/conf.d/aws_allow.conf
server {
    # Allow only AWS IPs
    include /etc/nginx/conf.d/aws_allow.conf;
}
sudo nginx -s reload

Apache

curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/apache_aws_allow.conf \
  -o /etc/apache2/conf-available/aws_allow.conf
<Directory /var/www/html>
    AllowOverride None
    Require all denied
    Include /etc/apache2/conf-available/aws_allow.conf
</Directory>
sudo systemctl reload apache2

iptables

# Allow all Azure IPs
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/azure/iptables_azure_allow.sh | sudo bash

# Block GPTBot
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/gptbot/iptables_gptbot_deny.sh | sudo bash

UFW

# Allow GitHub Actions IPs
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/github/services/actions/ufw_github_actions_allow.sh | sudo bash

nftables

# Download nftables config
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/cloudflare/nftables_cloudflare_allow.conf \
  -o /etc/nftables.d/cloudflare_allow.conf

HAProxy

# Download ACL file
curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/haproxy_aws_allow.conf \
  -o /etc/haproxy/aws_ips.acl
frontend http
    acl is_aws src -f /etc/haproxy/aws_ips.acl
    use_backend aws_backend if is_aws

Caddy

curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/cloudflare/caddy_cloudflare_allow.conf

Provider Matrix

Provider IPv4 IPv6 Services Regions Merged CIDRs All Formats
AWS Y Y Y Y Y Y
Azure Y Y Y Y Y Y
Google Cloud Y Y Y Y Y Y
Oracle Y Y Y Y Y Y
Cloudflare Y Y Y Y
DigitalOcean Y Y Y Y
Fastly Y Y Y Y
GitHub Y Y Y Y Y
Linode Y Y Y Y
GoogleBot Y Y Y Y
BingBot Y Y Y Y
GPTBot Y Y Y Y
AppleBot Y Y Y
Apple Private Relay Y Y Y Y Y
Telegram Y Y Y Y
Vultr Y Y Y Y Y
PerplexityBot Y Y Y Y Y
DuckDuckBot Y Y Y Y
Amazonbot Y Y Y Y Y
Common Crawl Y Y Y Y
Zoom Y Y Y Y Y
Atlassian Y Y Y Y Y Y

Use Cases

  • Firewall rules — Allow only known cloud provider IPs to access your infrastructure
  • Bot management — Block or allow GoogleBot, BingBot, GPTBot/ChatGPT, AppleBot, PerplexityBot, DuckDuckBot, Amazonbot, CCBot crawlers
  • Privacy proxy detection — Identify iCloud Private Relay traffic using Apple's official egress IP list
  • AI crawler blocking — Use GPTBot IP lists to prevent AI training on your content
  • Security auditing — Identify whether suspicious IPs belong to cloud infrastructure
  • Compliance — Restrict traffic to specific cloud regions or services
  • WAF / CDN configuration — Whitelist upstream CDN IPs (Cloudflare, Fastly)
  • CI/CD security — Allow only GitHub Actions IPs to trigger deploys
  • SaaS whitelisting — Allow Atlassian (Jira, Confluence, Bitbucket) or Zoom webhook IPs through your firewall
  • Network analysis — Track how cloud IP space evolves over time via the changelog
  • IP attribution — Use the lookup tool to identify which cloud owns any IP

Automating Updates

All data updates daily at 00:00 UTC. Set up your systems to pull the latest:

Clone and schedule

git clone https://github.com/rezmoss/cloud-provider-ip-addresses.git

# Cron job: pull daily at 00:30 UTC (30 min after update)
30 0 * * * cd /path/to/cloud-provider-ip-addresses && git pull

Direct download

# Download specific files on a schedule
30 0 * * * curl -sL https://raw.githubusercontent.com/rezmoss/cloud-provider-ip-addresses/main/aws/nginx_aws_allow.conf -o /etc/nginx/conf.d/aws_allow.conf && sudo nginx -s reload

License

This project is dedicated to the public domain under the CC0 1.0 Universal Public Domain Dedication.

Acknowledgments

All IP range data is sourced from the official, publicly available endpoints provided by each respective organization. We are grateful to the following providers for making their network information openly accessible:

  • Amazon Web Services — for publishing their IP address ranges through their public JSON endpoint
  • Microsoft Azure — for maintaining downloadable Service Tags with comprehensive IP range data
  • Google Cloud Platform — for providing structured cloud IP range information
  • Cloudflare — for openly sharing their IPv4 and IPv6 edge network ranges
  • DigitalOcean — for publishing their IP allocations via their public geofeed
  • Oracle Cloud Infrastructure — for making their public IP ranges available in machine-readable format
  • Fastly — for providing their edge network IP list through their public API
  • GitHub — for exposing service-level IP ranges through their meta API
  • Linode (Akamai) — for maintaining a publicly accessible IP geofeed
  • Google Search (GoogleBot) — for documenting their crawler IP ranges for webmasters
  • Microsoft Bing (BingBot) — for publishing their crawler IP ranges to help site operators
  • OpenAI (GPTBot / ChatGPT) — for making their bot and crawler IP ranges publicly available
  • Apple (AppleBot) — for publishing their web crawler IP ranges for site operators
  • Apple (iCloud Private Relay) — for making Private Relay egress IP ranges available to help websites with geolocation and traffic analysis
  • Telegram — for publishing their official network CIDR ranges
  • Vultr (Constant) — for maintaining a publicly accessible IP geofeed
  • Perplexity AI (PerplexityBot) — for making their bot and user-agent IP ranges publicly available
  • DuckDuckGo (DuckDuckBot) — for publishing their crawler IP ranges for webmasters
  • Amazon (Amazonbot) — for making their crawler and search bot IP ranges publicly available
  • Common Crawl (CCBot) — for publishing their crawler IP ranges to support the open web
  • Zoom — for making their service, phone, and CDN IP ranges available in machine-readable format
  • Atlassian — for publishing their product IP ranges covering Jira, Confluence, Bitbucket, Trello, and more

Star History

Star History Chart

About

Daily-updated IP ranges for 20+ providers (AWS, Azure, GCP, Cloudflare, GitHub, Fastly, Linode + GoogleBot, BingBot, GPTBot) in 12+ formats: TXT, JSON, CSV, SQL, Nginx, Apache, iptables, nftables, UFW, HAProxy, Caddy + merged CIDRs

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages