Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Hello RajeshKumar G
We want to clarify why you see a private IP address (like 172.x.x.x) as the callerIpAddress in Azure Storage diagnostic logs, even when public network access is enabled for all networks. This is standard Azure behavior.
If access comes from another Azure resource or service, the traffic uses Microsoft’s internal network and doesn’t go through public source NAT, so Azure Storage records the internal private IP at the service boundary rather than the client’s public IP.
This usually happens when the client workload runs within Azure, especially in the same region as the storage account or uses Azure-managed routing like service endpoints, private connectivity, VPN, or ExpressRoute.
It’s not a security concern or misconfiguration and doesn’t impact data access when all networks are allowed.
Microsoft confirms this is intentional. For network restrictions, use virtual network controls or private endpoints instead of public IP allow-listing, since Azure-to-Azure traffic may not show a public source IP.
Check the below reference documents for:
https://dotnet.territoriali.olinfo.it/en-us/answers/questions/5634512/azure-storage-account-access-logs-calleripaddresshttps://dotnet.territoriali.olinfo.it/en-us/azure/storage/common/storage-network-security-limitations#restrictions-for-ip-network-rules
I hope the above answer helps you! Please let us know if you have any further questions.
Please don't forget to "upvote" where the information provided will help you, this can be beneficial to other members of the community.