Get started - it's free!
Log in
© 2026

Reserved IP addresses

Tailscale assigns each device in your tailnet a unique Tailscale IP address from the Carrier-Grade NAT (CGNAT) range defined in RFC 6598. This range doesn't conflict with common private network ranges like 10.0.0.0/8 or 192.168.0.0/16.

Tailscale reserves specific addresses within this range for internal services and device management. This topic helps you understand these reservations when configuring IP pools, writing access control policies, or troubleshooting connectivity.

The following table lists the reserved IP addresses and ranges used by Tailscale:

Address or rangePurpose
100.64.0.0/10The CGNAT range Tailscale uses for device IP addresses (100.64.0.0 through 100.127.255.255).
100.100.0.0/24Tailscale internal use. Unavailable for IP pools.
100.100.100.0/24Tailscale internal use. Unavailable for IP pools.
100.100.100.100Quad100, a device-local service address. Provides a DNS resolver on port 53 and a device management interface on port 80.
100.115.92.0/23Tailscale internal use. Unavailable for IP pools.
fd7a:115c:a1e0::/48The IPv6 unique local address prefix Tailscale uses for device IPv6 addresses.
fd7a:115c:a1e0::53IPv6 equivalent of Quad100. Provides the same DNS resolver and device management services.
100.101.102.103Reserved for the tshello example service.

What this means for you

You can use Tailscale IP addresses directly in access control list (ACL) rules and grants. For example, specify a device by its 100.x.y.z address in the src or dst fields. Keep in mind:

  • Reserved ranges aren't assignable. Tailscale never assigns addresses from the reserved ranges (100.100.0.0/24, 100.100.100.0/24, or 100.115.92.0/23) to devices, so you don't need to account for them in your policies.

  • Quad100 is device-local. Traffic to 100.100.100.100 stays on the local device and doesn't traverse your tailnet. You can't target Quad100 in access control policies.

  • IP pools can't overlap reserved ranges. When configuring IP pools, ensure your ranges don't overlap with reserved addresses.

If you integrate Tailscale with third-party services, verify that your network infrastructure doesn't use the CGNAT range (100.64.0.0/10) for other purposes. Some internet service providers (ISPs) use this range, which can cause CGNAT conflicts.

Troubleshooting

If you experience connectivity issues related to IP addresses, the following resources can help:

  • CGNAT conflicts: If your ISP or another virtual private network (VPN) uses the 100.64.0.0/10 range, you might experience routing conflicts. Refer to CGNAT conflicts for solutions, including how to disable IPv4 selectively or tailnet-wide.
  • Multiple devices with the same IP: Two devices can have the same Tailscale IP address if you restore one from a backup or clone a file system. Refer to multiple devices have the same 100.x IP address to resolve this.
  • DNS resolution issues: If MagicDNS isn't resolving device names, verify that your device can reach the Quad100 DNS resolver at 100.100.100.100:53. For Linux-specific issues, refer to configuring Linux DNS.
  • Device connectivity: For general connectivity troubleshooting, refer to troubleshoot device connectivity.

Last updated Jan 12, 2026