Assuming the request is regarding Data Actions, then that is generally solved by calling our API route that describes the specific IP addresses utilized via the NAT Gateways that handle the egress of those data action invocations (note that this doesn't apply to Functions, but does apply to all other data action requests): https://developer.genesys.cloud/organization/utilities-apis#get-api-v2-ipranges. This API request also describes the IP addresses used by another of other services/features in Genesys Cloud. Here's the example response for the US East region:
{
"entities": [
{
"cidr": "52.200.222.10/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "52.200.222.10/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "52.201.10.219/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "18.211.239.119/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "52.201.21.52/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "18.214.48.52/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "data-actions",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "smtp",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "imap",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "graphapi",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "open-messaging",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "audiohook",
"region": "us-east-1"
},
{
"cidr": "18.214.192.194/32",
"service": "bot-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.192.168/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.192.168/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "18.214.192.168/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "52.200.215.52/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "52.200.215.52/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "52.200.215.52/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.86.78/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.86.78/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "52.201.86.78/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "23.20.152.234/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "23.20.152.234/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "23.20.152.234/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.62.251/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "52.201.62.251/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "52.201.62.251/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.38.108/32",
"service": "audio-connector",
"region": "us-east-1"
},
{
"cidr": "18.214.38.108/32",
"service": "byot-stt",
"region": "us-east-1"
},
{
"cidr": "18.214.38.108/32",
"service": "tts-connector",
"region": "us-east-1"
},
{
"cidr": "169.150.110.10/32",
"service": "api",
"region": "us-east-1"
},
{
"cidr": "169.150.111.10/32",
"service": "api",
"region": "us-east-1"
}
]
}
------------------------------
Richard Schott
Product Manager
------------------------------
Original Message:
Sent: 05-20-2025 01:32
From: Mohammad Saad
Subject: AWS IP Pool and Our Angry Customers
Hello OKTAY KEMAL,
Here I am after 5 years,How was the problem solved? We are facing the same issue with our client who is refusing to add/open all IP addresses on the firewall.
------------------------------
Mohammad Saad
Tech Engineer
Original Message:
Sent: 04-13-2020 12:23
From: OKTAY KEMAL
Subject: AWS IP Pool and Our Angry Customers
Hi Everyone,
I know that this question was asked a couple of times throughout the years and sadly left unanswered by all the community and Genesys representatives. On one of the posts, it was answered indeed but the answer was searching for a needle in a haystack.
Let me get to the problem...
After many sales and technical meetings, a customer happily decides to buy the GenesysCloud solution and starts building their self-service IVR.
Their IVR includes sending informational SMS' on some points. They use an ITSP's Web Service Interface for sending these SMS' with their current on-prem solution. There is a Telco Security Regulation that all ITSP should define the IP Ranges of the hosts calling the "SMS Send" service. It is enforced by the law. So all they did in the past was providing the IP address of their firewall to their ITSP and they were able to use the service by adding some FW forwarding rules.
Now they are trying to achieve the same on PureCloud. They created a Custom Data Action. It is simple I agree... But, the test failed because they forgot to provide the source IP address or addresses of the GenesysCloud or the AWS. The addresses from where this service will be called. They simply can't open this service to all/all as there is a serious penalty for that.
So, checking the documentation one ends up finding the https://ip-ranges.amazonaws.com/ip-ranges.json link. The one which when you open you get 16.000 lines of a JSON text file. Wow, imagine giving this to the customer's firewall admin or their ITSP and telling them to allow them all. Imagine their reply....
OK, so the one moves forward and tries to find the region where they are hosted. He learns it's Ireland and that it's in eu-west-1 (rds.eu-west-1.amazonaws.com). Filtering the big list with eu-west-1 he narrows it down to 224 entries. So there are 224 IP ranges that he needs to send to the customer. Think about it... "All you need to do to enable sending SMS is to allow a couple of IP Addresses." -Just a couple? "Yes, 224 IP ranges."
- How about the updates? I mean how do I know if AWS adds or removes a range? "Welllll....s***".
Is it just me or do you guys also think that Genesys needs to do something about this problem?
If nothing is possible for reducing the IP ranges at least a simple app published on the GenesysCloud developer or help sites would do some help to all. An app that gives a filtered list of IP addresses based on ones login and ORG information. An app that would maybe use the following output would really be helpful to all: Get-AWSPublicIpAddressRange -Region xxxxx
Anyway, I just wanted to say that this problem is frustrating for our customers and damaging our successful sales and partner relations.
I wonder if there are others out there who agree with me.
#API/Integrations
------------------------------
Thanks,
Oktay Kemal
CCR
------------------------------