Download current IP ranges (CIDRs) for Fastly cloud infrastructure.
Choose your preferred format. All downloads are permalinks that always provide the latest data.
# Download with curl
curl -O https://cloud-ip-ranges.com/download/fastly.txt
# Or download with wget
wget https://cloud-ip-ranges.com/download/fastly.txt
# Download and block Fastly IPs with iptables
wget -O fastly_ips.txt https://cloud-ip-ranges.com/download/fastly.txt
while read ip; do
iptables -A INPUT -s $ip -j DROP
iptables -A OUTPUT -d $ip -j DROP
done < fastly_ips.txt
# Download and block Fastly IPs with UFW
wget -O fastly_ips.txt https://cloud-ip-ranges.com/download/fastly.txt
while read ip; do
ufw deny from $ip
ufw deny to $ip
done < fastly_ips.txt
# Create fail2ban filter for Fastly
sudo tee /etc/fail2ban/filter.d/fastly-block.conf << EOF
[Definition]
failregex = ^.*$
ignoreregex =
EOF
# Create jail configuration
sudo tee /etc/fail2ban/jail.d/fastly-block.conf << EOF
[fastly-block]
enabled = true
filter = fastly-block
action = iptables-allports[name=fastly]
logpath = /tmp/fastly_ips.txt
findtime = 1
bantime = -1
maxretry = 1
EOF
# Download IP list and restart fail2ban
wget -O /tmp/fastly_ips.txt https://cloud-ip-ranges.com/download/fastly.txt
sudo systemctl restart fail2ban
# Create alias table for Fastly IPs
# 1. Download the IP list
wget -O fastly_ips.txt https://cloud-ip-ranges.com/download/fastly.txt
# 2. In pfSense/OPNsense web interface:
# - Go to Firewall > Aliases
# - Create new alias named "FASTLY_BLOCK"
# - Type: Network(s)
# - Import the downloaded file
#
# 3. Create firewall rule:
# - Go to Firewall > Rules > WAN
# - Add rule: Action=Block, Source=FASTLY_BLOCK
These IP ranges are sourced directly from Fastly's official feeds and are updated regularly to ensure accuracy. The data includes IPv4 and IPv6 ranges used by Fastly's infrastructure worldwide. Last update was 41 minutes ago.