Blitzz Help Center

Network Requirements and Recommendations - Firewall Configuration

This article is intended for network administrators responsible for firewall and web security configuration. It will help you configure your network to support Blitzz video calls and services.

Some firewalls block applications like Blitzz from accessing the internet unless explicitly allowed. You will need to whitelist the domains, IP addresses, and ports listed below to ensure Blitzz functions correctly on your network. Both incoming and outgoing TCP traffic must be permitted.


Required Domains & IP Addresses

We recommend whitelisting *.blitzz.co to cover all subdomains. If your firewall does not support wildcard domains, whitelist each entry individually using the table below.

#Domain / IP AddressProtocolPurpose
1*.blitzz.co (recommended)HTTPS/443Covers all Blitzz subdomains. Use rows 2–10 if wildcard is not supported.
2{company-subdomain}.blitzz.coHTTPS/443Replace {company-subdomain} with your assigned subdomain (e.g. acme.blitzz.co)
3services.blitzz.coHTTPS/443Backend services and push notifications
4media.blitzz.coHTTPS/443Media uploads
5analyticapi.blitzz.coHTTPS/443Data analytics
6api-ga.blitzz.coHTTPS/443Backend services and push notifications for new portals
7socket-ga.blitzz.coWSS/443CoBrowse product
8storageapi.blitzz.coHTTPS/443Accessing and storing media
9blitzzmedia.blob.core.windows.netHTTPS/443Accessing and storing media
10*.launchdarkly.comHTTPS/443Feature previews and premium feature access
11159.69.72.82
138.201.23.91
94.130.129.237
HTTPS/443Localization strings for region-specific language support
12api.twilio.comHTTPS/443REST API for creating rooms
13video.twilio.comHTTPS/443REST API for video features
14global.vss.twilio.comWSS/443Signaling communication
15sdkgw.us1.twilio.comWSS/443Video SDK for Android, iOS, and JavaScript
1654.70.204.128/27
us-west-2.quicksight.aws.amazon.com
HTTPS/443Reports and dashboards

Media Server IP Ranges (Video Calls & Call Recordings)

The following IP ranges and ports are required for audio, video, and data exchange during calls, and for the Call Recording feature if enabled.

By default, Blitzz routes traffic through the server closest to the first participant. If you need to restrict traffic to specific regions only, please contact our support team — note that this may affect call quality for participants in other regions.

Ports required: 10,000–60,000 UDP/SRTP/SRTCP and TLS/443 or UDP/3478
We strongly recommend enabling UDP for all incoming connections on these IP ranges across ports 10,000–60,000 and 3478.

#IP Address RangePortsRegion
134.216.110.128 - 34.216.110.159
54.244.51.0 - 54.244.51.255
44.234.69.0 - 44.234.69.127
10,000–60,000 UDP & TLS/443 or UDP/3478US West Coast (Oregon)
234.203.254.0 - 34.203.254.255
54.172.60.0 - 54.172.61.255
34.203.250.0 - 34.203.251.255
3.235.111.128 - 3.235.111.255
10,000–60,000 UDP & TLS/443 or UDP/3478US East Coast (Virginia)
313.210.2.128 - 13.210.2.159
54.252.254.64 - 54.252.254.127
3.25.42.128 - 3.25.42.255
10,000–60,000 UDP & TLS/443 or UDP/3478Australia
418.231.105.32 - 18.231.105.63
177.71.206.192 - 177.71.206.255
18.230.125.0 - 18.230.125.127
10,000–60,000 UDP & TLS/443 or UDP/3478Brazil
552.59.186.0 - 52.59.186.31
18.195.48.224 - 18.195.48.255
18.156.18.128 - 18.156.18.255
10,000–60,000 UDP & TLS/443 or UDP/3478Germany
652.215.253.0 - 52.215.253.63
54.171.127.192 - 54.171.127.255
52.215.127.0 - 52.215.127.255
3.249.63.128 - 3.249.63.255
10,000–60,000 UDP & TLS/443 or UDP/3478Ireland
752.66.193.96 - 52.66.193.127
52.66.194.0 - 52.66.194.63
3.7.35.128 - 3.7.35.255
10,000–60,000 UDP & TLS/443 or UDP/3478India
813.115.244.0 - 13.115.244.31
54.65.63.192 - 54.65.63.255
18.180.220.128 - 18.180.220.255
10,000–60,000 UDP & TLS/443 or UDP/3478Japan
913.229.255.0 - 13.229.255.31
54.169.127.128 - 54.169.127.191
18.141.157.128 - 18.141.157.255
10,000–60,000 UDP & TLS/443 or UDP/3478Singapore

Logs & Debugging (Recommended)

Blitzz uses Google Firebase for log capture to help diagnose issues. We recommend allowing outbound connections on the following ports for all IPs (*):

  • TCP 5228 — Primary port used by Firebase Cloud Messaging (GCM)
  • TCP 5229 — Used occasionally
  • TCP 5230 — Used occasionally

Note: GCM does not use fixed IP addresses and changes IPs frequently. Configure rules by port only for this service. See Firebase documentation for more details.


VPN Considerations

If users on your network connect via VPN, video call traffic may be affected by the additional latency and bandwidth overhead a VPN introduces. To ensure the best call quality, we recommend configuring split tunneling so that Blitzz traffic bypasses the VPN tunnel. Use the domain and IP whitelist above to configure your split tunnel rules.


Test Your Network

Once configured, run our diagnostic tests to verify your network is set up correctly:

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.