Skip to main content
Configuration
Allow Augment traffic from static IPs
Locate Augment static IP addresses and configure firewalls, allowlists, and network policies for Augment Agent and its integrations.
Augment routes all server-side outbound traffic — such as agent tool calls and integration requests to GitHub, Linear, and other connected services — through region specific static IP addresses. These IPs do not apply to traffic between your local IDE or CLI and Augment’s servers. Add these IPs to your firewalls and allowlists when you need predictable source addresses for compliance or access control.
The DNS record returns the exact set of IP addresses Augment uses for outbound traffic in that region. Addresses are stable, and repeated lookups should return the same list. Rerun the lookup periodically or set up monitoring so you are alerted if Augment adds new addresses.
Ensure local DNS resolvers can reach the Augment records and that caching layers are not serving stale results.
When static IP support helps
You likely need static IPs when- Your GitHub organization enforces IP allowlists.
- Internal APIs, artifact registries, or databases sit behind IP restricted networks.
- Corporate firewalls require a known source IP before allowing outbound agent traffic.
- Compliance policies mandate tracking specific egress addresses.
- Integrated services such as GitHub, Linear, Slack, and others are accessible without IP restrictions.
- You only use Augment with SaaS tools that do not enforce IP allowlists.
- Your network does not block traffic based on source IP.
Get the IP addresses for your region
Always perform the lookup from a network that mirrors the environment enforcing the allowlist so you can detect DNS filtering or caching differences.
US region
EU region
Add the IPs to common services
GitHub Enterprise with IP restrictions
- Run the lookup for your region.
- In GitHub, open Settings -> Security -> IP allow list.
- Add each Augment IP address with a clear description such as
Augment Agent.
Private artifact registries
Add the IP addresses to the allowlist for the registry host. For example, with a private npm registry include the addresses in the service configuration before agents pull packages.Corporate firewalls
- Allow inbound traffic to your services from the Augment IP addresses.
- Note the rules in your change management system for auditing.
- Monitor firewall logs for denied connections from Augment IPs.
API gateways
Databases with IP allowlists
Implementation checklist
- Use the DNS entry for the region where your Augment deployment runs (
us-staticoreu-static). - Document which services rely on Augment IPs and who owns the configuration.
- Limit access to only the systems Augment needs, following least privilege.
- Review and confirm allowlist entries during regular security audits.
- Configure alerts for DNS changes or repeated blocked traffic from Augment IPs.
Troubleshooting
If integrations stop working- Rerun
dig +short <region>-static.augmentcode.comand confirm the addresses match your allowlists. - Review firewall or service logs for blocked requests from Augment IPs.
- Update the allowlist if any addresses changed or were missed.
