Network Traffic
Incident Management is now generally available! Incident Management is now generally available!

Network Traffic

Traffic is always initiated by the Agent to Datadog. No sessions are ever initiated from Datadog back to the Agent:

  • All traffic is sent over SSL

  • The destination for:

    • APM data is trace.agent.
    • Live Containers data is process.
    • Logs data includes agent-intake.logs. for TCP traffic, agent-http-intake.logs. in HTTP, and several others. Review the complete list of logs endpoints for more information.
    • Orchestrator Resources data is orchestrator..
    • HIPPA logs data is the same as for all Logs, but also the following legacy endpoints are supported:
      • tcp-encrypted-intake.logs.
      • lambda-tcp-encrypted-intake.logs.
      • gcp-encrypted-intake.logs.
      • http-encrypted-intake.logs.
    • Synthetic Private Locations is intake.synthetics. for version 0.1.6+ and intake-v2.synthetics. for versions 0.2.0+.
    • All other Agent data:
      • Agents < 5.2.0 app.

      • Agents >= 5.2.0 <VERSION>-app.agent.

        This decision was taken after the POODLE problem. Versioned endpoints start with Agent v5.2.0, where each version of the Agent calls a different endpoint based on the version of the Forwarder. For example, Agent v5.2.0 calls 5-2-0-app.agent.. Therefore you must whitelist *.agent. in your firewall(s).

Since v6.1.0, the Agent also queries Datadog’s API to provide non-critical functionality (For example, display validity of configured API key):

  • Agent >= 7.18.0/6.18.0 api.
  • Agent < 7.18.0/6.18.0 app.

All of these domains are CNAME records pointing to a set of static IP addresses. These addresses can be found at https://ip-ranges..

The information is structured as JSON following this schema:

    "version": 1,                       // <-- incremented every time this information is changed
    "modified": "YYYY-MM-DD-HH-MM-SS",  // <-- timestamp of the last modification
    "agents": {                         // <-- the IPs used by the Agent to submit metrics to Datadog
        "prefixes_ipv4": [              // <-- list of IPv4 CIDR blocks
        "prefixes_ipv6": [              // <-- list of IPv6 CIDR blocks
    "api": {...},                       // <-- same for non-critical Agent functionality (querying informaton from API)
    "apm": {...},                       // <-- same structure as "agents" but IPs used for the APM Agent data
    "logs": {...},                      // <-- same for the logs Agent data
    "process": {...},                   // <-- same for the process Agent data
    "orchestrator": {...},              // <-- same for the process Agent data
    "synthetics": {...},                // <-- not used for Agent traffic (Datadog source IPs of bots for synthetic tests)
    "webhooks": {...}                   // <-- not used for Agent traffic (Datadog source IPs delivering webhooks)

Each section has a dedicated endpoint, for example:

  • https://ip-ranges./logs.json for the IPs used to receive logs data over TCP.
  • https://ip-ranges./apm.json for the IPs used to receive APM data.


You should whitelist all of these IPs. While only a subset are active at any given moment, there are variations over time within the entire set due to regular network operation and maintenance.

Open Ports

All outbound traffic is sent over SSL via TCP / UDP.

Open the following ports in order to benefit from all the Agent functionalities:

  • Outbound:

  • Inbound:

    • 8125/udp: DogStatsd. Unless non_local_traffic is set to true. This port is available on localhost:

      • ::1
      • fe80::1
    • 8126/tcp: port for the APM Receiver

    • 17123/tcp: Agent forwarder, used to buffer traffic in case of network splits between the Agent and Datadog

    • 17124/tcp: optional graphite adapter

Using Proxies

For a detailed configuration guide on proxy setup, see Agent Proxy Configuration.

Further Reading