IP addresses and domains for Databricks services and assets
This article lists:
- IP addresses and domains for Databricks services and assets.
- Private Service Connect attachment URLs and project numbers.
You may need this information if you are configuring your Databricks workspace to limit network egress using a firewall.
Databricks control plane addresses
The following tables list the IP addresses or domain names the Databricks control plane uses for each supported region.
For a complete list of ports to configure in your security group egress rules, see Firewall configuration overview.
Inbound IPs to Databricks control plane
Always allowlist the provided domain names (FQDNs) for secure cluster connectivity (SCC) relay endpoints, rather than individual IP addresses. IP addresses behind these domains change periodically due to infrastructure updates and multi-availability zone deployments. Customers who allowlist specific IP addresses may experience service disruptions when infrastructure changes occur. If you must use IP addresses, implement automated DNS resolution and regularly update your firewall rules.
Google Cloud region | Service | Public IP, domain name, or project number |
|---|---|---|
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
| |
| Control Plane services, including default storage and webapp |
|
SCC relay |
| |
SCC relay for Private Service Connect |
|
Outbound IPs from Databricks control plane
Google Cloud Region | Service | Public IP |
|---|---|---|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
| Control Plane NAT |
|
Outbound IPs for serverless compute firewall preview
This feature is in Private Preview. To try it, contact your Databricks account team.
If your workspace is enabled for serverless compute firewall (Private Preview), you receive a URL that points to a JSON file containing the outbound IP addresses. Use this information to allow or deny traffic from Databricks services.
Databricks might update outbound IPs as often as once every 30 days. Updated IPs become active as soon as 60 days after publication. After new Databricks regions become available, their active IPs are published to the file.
To find the outbound IPs for your environment, filter the JSON for entries where service is Databricks, platform is gcp, type is outbound, and region matches your workspace region. To keep these current, build automation that fetches the JSON periodically, compares the timestampSeconds field against the previously saved version to detect changes, updates your firewall allow-list with any new IPs, and saves each version of the file for reference.
Databricks is decommissioning the static list of serverless outbound IPs shared through legacy versions of this preview. After May 25, 2026, workloads relying on legacy allowlists might experience connection errors.
Update your configuration by May 25, 2026 to avoid disruption to your serverless workloads.
Addresses for legacy Hive metastore
The legacy Hive metastore uses port 3306.
Google Cloud Region | Service | Public IP |
|---|---|---|
| Default metastore |
|
| Default metastore |
|
| Default metastore | 34.93.83.239` |
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
| Default metastore |
|
Private Service Connect (PSC) attachment URIs and project numbers
If you want to enable Google Private Service Connect (PSC) on a workspace, you might need the PSC service attachment URIs and project numbers for your workspace region, listed here.
See Enable Private Service Connect for your workspace.
asia-northeast1- Workspace:
projects/general-prod-asianortheast1-01/regions/asia-northeast1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-asia-northeast1/regions/asia-northeast1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
76016113524,758372176987 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
923768640139 - Audit log delivery project #:
68422481410,85638097580,682883591785,693491988820,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066pps838s-wqiyf@uc-asianeast1.iam.gserviceaccount.com
- Workspace:
asia-south1- Workspace:
projects/gen-prod-asias1-01/regions/asia-south1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-asia-south1/regions/asia-south1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
330071231143,631686578243 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
570609266169 - Audit log delivery project #:
68422481410,85638097580,112010197761,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-067h53patg-btqhx@uc-asias1.iam.gserviceaccount.com
- Workspace:
asia-southeast1- Workspace:
projects/general-prod-asiasoutheast1-01/regions/asia-southeast1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-asia-southeast1/regions/asia-southeast1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
163855694937,1034099807081 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
997754390120 - Audit log delivery project #:
68422481410,85638097580,682883591785,693491988820,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppse4ng-ghu5q@uc-asiasoutheast1.iam.gserviceaccount.com
- Workspace:
australia-southeast1- Workspace:
projects/general-prod-ausoutheast1-01/regions/australia-southeast1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-australia-southeast1/regions/australia-southeast1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
890675851652,857749035294 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
1098168977388 - Audit log delivery project #:
68422481410,85638097580,450704425940,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppskjuk-oh5z9@uc-ausoutheast1.iam.gserviceaccount.com
- Workspace:
europe-west1- Workspace:
projects/general-prod-europewest1-01/regions/europe-west1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-europe-west1/regions/europe-west1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
623104702041,539637529424 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
837221441770 - Audit log delivery project #:
68422481410,85638097580,15353312707,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppsqf0k-uej7u@uc-euwest1.iam.gserviceaccount.com
- Workspace:
europe-west2- Workspace:
projects/general-prod-europewest2-01/regions/europe-west2/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-europe-west2/regions/europe-west2/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
204760216014,374166936325 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
751957430136 - Audit log delivery project #:
68422481410,85638097580,15353312707,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppsvq4g-qufud@uc-euwest2.iam.gserviceaccount.com
- Workspace:
europe-west3- Workspace:
projects/general-prod-europewest3-01/regions/europe-west3/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-europe-west3/regions/europe-west3/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
622303457766,281723498678 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
691428682010 - Audit log delivery project #:
68422481410,85638097580,15353312707,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppt54is-keeep@uc-europewest3.iam.gserviceaccount.com
- Workspace:
me-central2- Workspace:
projects/gen-prod-mec2-01/regions/me-central2/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-me-central2/regions/me-central2/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
762672234140,440105855710 - Control plane asset project #:
643670579914 - Control plane Unity Catalog project #:
624668677403 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-credential-06cplolmrk-3a@uc-mec2.iam.gserviceaccount.com
- Workspace:
northamerica-northeast1- Workspace:
projects/general-prod-nanortheast1-01/regions/northamerica-northeast1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-na-northeast1/regions/northamerica-northeast1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
878472879812,67008890036 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
262684322583 - Audit log delivery project #:
68422481410,85638097580,510009392761,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppt9s00-wp6b1@uc-nanortheast1.iam.gserviceaccount.com
- Workspace:
southamerica-east1- Workspace:
projects/gen-prod-saeast1-01/regions/southamerica-east1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-southamerica-east1/regions/southamerica-east1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
299178298712,120952445555 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
974325785393 - Audit log delivery project #:
68422481410,85638097580,682883591785,886671671450,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-credential-06bmfntfis-yk@uc-saeast1.iam.gserviceaccount.com
- Workspace:
us-central1- Workspace:
projects/gcp-prod-general/regions/us-central1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-us-central1/regions/us-central1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
68422481410and85638097580,52212564371 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
683414710976 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066molu6ek-znwhn@uc-uscentral1.iam.gserviceaccount.com
- Workspace:
us-east1- Workspace:
projects/general-prod-useast1-01/regions/us-east1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-us-east1/regions/us-east1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
51066298900,126331279425 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
234110679923 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066pptsgmg-dkbon@uc-useast1.iam.gserviceaccount.com
- Workspace:
us-east4- Workspace:
projects/general-prod-useast4-01/regions/us-east4/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-us-east4/regions/us-east4/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
121886670913,263270992834 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
522339604799 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066moil41c-xy2gx@uc-useast4.iam.gserviceaccount.com
- Workspace:
us-west1- Workspace:
projects/general-prod-uswest1-01/regions/us-west1/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-us-west1/regions/us-west1/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
646990673688,121996733804 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
563665329883 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables project #:
68598579867 - System tables Google Service Account:
db-uc-storage-066ppueukg-tyrut@uc-uswest1.iam.gserviceaccount.com
- Workspace:
us-west4- Workspace:
projects/general-prod-uswest4-01/regions/us-west4/serviceAttachments/plproxy-psc-endpoint-all-ports - SCC relay:
projects/prod-gcp-us-west4/regions/us-west4/serviceAttachments/ngrok-psc-endpoint - Control plane VPC host project #:
321004414578,863141203972 - Control plane asset project #:
323146983994 - Control plane Unity Catalog project #:
543816255200 - Audit log delivery project #:
68422481410,85638097580,682883591785,889794603906 - System tables Google Service Account:
db-uc-storage-066ppujprs-v06wt@uc-uswest4.iam.gserviceaccount.com
- Workspace:
Reserved IP ranges for Databricks internal use
Databricks reserves certain IP ranges for internal applications to avoid potential IP conflicts. Customers should avoid using these ranges in their network configurations:
- 127.187.216.0/24
- 192.168.216.0/24
- 198.18.216.0/24
These reserved IP ranges apply to all types of workspaces and all cluster types, including classic and serverless clusters, as well as Databricks Container Service clusters.
Databricks Container Service clusters
For Databricks Container Service (DCS) clusters, you should also avoid using the default Docker network range:
- 172.17.0.0/16
By reserving these IP ranges for Databricks internal use and avoiding the default Docker network range for DCS clusters, you can help prevent potential IP conflicts and ensure the smooth operation of your Databricks environment.