Amazon Route 53 Changing Health Checking IP Ranges

If you’re using Route 53 health checks, you must ensure that your router and firewall rules allow inbound traffic from the IP addresses used by Route 53’s health checkers, so that Route 53 can access the endpoints that you specify in your health checks.

As we have explained earlier in our forum post [ https://forums.aws.amazon.com/ann.jspa?annID=1838 ], we are adding new IP ranges to the existing ranges.

The following is the list of existing IP ranges currently used by Route53 health checking service:

54.228.16.0/26
54.232.40.64/26
54.241.32.64/26
54.243.31.192/26
54.245.168.0/26
54.248.220.0/26
54.251.31.128/26
54.252.79.128/26

In addition to the list above, the following is the list of new IP ranges from which Route 53 will be conducting health checks:

54.183.255.128/26
54.244.52.192/26
54.250.253.192/26
54.252.254.192/26
54.255.254.192/26
107.23.255.0/26
176.34.159.192/26
177.71.207.128/26

Please ensure that the router / firewall rules for all of your endpoints that you are health checking with Route 53 are configured to allow incoming traffic from both existing and new IP ranges.

Related Post
cloudfront-diagram
Amazon CloudFront Now Support Configurable Default TTL and Max TTL

Amazon CloudFront now allows you to set two new values, a Default TTL (Time To Live) and a Max time-to-live, so that you can control how long CloudFront caches your objects in each CDN node. This dramatically increases your control over the cache duration which previously only allowed you to set the Minimum TTL. Learn more about setting cascading cache rules for […]

Read more
Mod Security & Amazon Cloud Front Problems

Misuse of CloudFront by hackers can get your CDN blocked by your server, this can be a problem. Unfortunately for security reasons you do not want to allow CloudFront to by pass mod security, as this can be exploited by Mod Security: 216.137.42.131 # lfd: (mod_security) mod_security (id:210410) triggered by 216.137.42.131 (US/United States/server-216-137-42-131.dfw3.r.cloudfront.net): 5 in […]

Read more
Comodo Web Application Firewall – Modsecurity Vendor Rules For cPanel/WHM

ColumbusSoft’s Free collection of multiple 3rd-Party and customer ModSecurity rule sets to add additional security with extra attention to WordPress, WHMCS, Joomla, Prestashop and etc. In this release we have included the Comodo Web Application Firewall, a set of Free ModSecurity Rules from Comodo that provides powerful, real-time protection for your web applications, this is while cPanel/WHM has launched […]

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Mobile Detected
Tablet Detected
Desktop Detected
Large Screen Detected
Retina Display Detected