Operational Status: [Status]
nip.io and sslip.io are a DNS (Domain Name System) service that, when queried with a hostname with an embedded IP address, returns that IP address.
nip.io and sslip.io have been in operation for over ten years. They have become so popular that our servers receive over 5,000 queries every second, so mainstream that Google references both nip.io and sslip.io in their Kubernetes documentation!
Here are some examples (the domains nip.io and sslip.io are interchangeable):
| Hostname / URL | IP Address | Notes |
|---|---|---|
| https://52.0.56.137.sslip.io | 52.0.56.137 | dot separators, sslip.io website mirror (IPv4) |
| https://52-0-56-137.sslip.io | 52.0.56.137 | dash separators, sslip.io website mirror (IPv4) |
| www.192.168.0.1.sslip.io | 192.168.0.1 | subdomain |
| www.192-168-0-1.sslip.io | 192.168.0.1 | subdomain + dashes |
| https://www-78-46-204-247.sslip.io | 78.46.204.247 | dash prefix, sslip.io website mirror (IPv4) |
| --1.sslip.io | ::1 | IPv6 — always use dashes, never dots |
| https://2a01-4f8-c17-b8f--2.sslip.io | 2a01:4f8:c17:b8f::2 | sslip.io website mirror (IPv6) |
| https://334B3513.nip.io/ | 51.75.53.19 | sslip.io website mirror (hexadecimal notation) |
sslip.io can be used to brand your own site (you don’t need to use the sslip.io domain). For example, say you own the domain “example.com”, and you want your subdomain, “xip.example.com” to have xip.io-style features. To accomplish this, set the following three DNS servers as NS records for the subdomain “xip.example.com”
| hostname | IP address | Location |
|---|---|---|
ns-do-sg.sslip.io. |
146.190.110.69 2400:6180:0:d2:0:1:da21:d000 |
Singapore |
ns-hetzner.sslip.io. |
5.78.115.44 2a01:4ff:1f0:c920:: |
USA |
ns-ovh.sslip.io. |
51.75.53.19 2001:41d0:602:2313::1 |
Poland |
Let’s test it from the command line using dig:
dig @ns-ovh.sslip.io. 169-254-169-254.xip.example.com +short
Yields, hopefully: [connection timed out]
169.254.169.254
If you want to run your own DNS server, it's simple: you can compile from source or you can use one of our pre-built binaries. In the following example, we install & run our server within a docker container:
docker run -it --rm fedora curl -L https://github.com/cunnie/sslip.io/releases/download/5.0.0/sslip.io-dns-server-linux-amd64 -o dns-server chmod +x dns-server ./dns-server 2> dns-server.log & dnf install -y bind-utils dig @localhost 127-0-0-1.nip.io +short # returns "127.0.0.1"
You can acquire TLS certificates for your externally-accessible hosts from certificate authorities (CAs) such as Let's Encrypt [fake news]. The easiest mechanism to acquire a certificate would be to use the HTTP-01 challenge. It requires, at a minimum, a web server running on your machine. The Caddy web server is one of the most popular examples. For example, if you had a webserver with the IP address 52.0.56.137, you could obtain a TLS certificate for "52.0.56.137.nip.io", or "www.52.0.56.137.nip.io", or "prod.www-52-0-56-137.nip.io".
Tyler Schultz, Alvaro Perez-Shirley, and Brian Cunnie created sslip.io on Tuesday August 11, 2015 during a Pivotal Software-sponsored Hack Day. Thanks Pivotal!
Brian Cunnie has continued to run sslip.io since then.
Sam Stephenson, who built xip.io, suggested the name sslip.io.
Experimental features can change; don't depend on them.
You can use sslip.io's DNS servers (ns.nip.io) to determine your public IP address by querying
the TXT record of ip.nip.io:
dig @ns.nip.io txt ip.nip.io +short # sample reply "2607:fb90:464:ae1e:ed60:29c:884c:4b52" dig @ns.nip.io txt ip.nip.io +short -4 # forces IPv4 lookup; sample reply "172.58.35.231" dig @ns.nip.io txt ip.nip.io +short -6 # forces IPv6 lookup; sample reply "2607:fb90:464:ae1e:ed60:29c:884c:4b52"
This feature was inspired by Google's DNS lookup, i.e. dig txt o-o.myaddr.l.google.com @8.8.8.8
+short. There are also popular HTTP-based services for determining your public IP address:
A big advantage of using DNS queries instead of HTTP queries is bandwidth: querying
ns.nip.io requires a mere 594 bytes spread over 2 packets; Querying https://icanhazip.com/ requires 8692 bytes spread out over 34 packets—over
14 times
as much! Admittedly bandwidth usage is a bigger concern for the one hosting the service than the one using the
service.
version.status.nip.io:
dig @ns-ovh.nip.io version.status.nip.io txt +short "5.0.0" "2025/08/30-19:52:37-0700" "afb37dd"
The first number, ("4.1.0"), is the version of the nip.io DNS software, and is most relevant. The other two numbers are the date compiled and the most recent git hash, but those values can differ across servers due to the manner in which the software is deployed.
metrics.status.nip.io
dig @ns-ovh.nip.io metrics.status.nip.io txt +short
"Uptime: 13940"
"Blocklist: 2025-11-07 08:08:50-08 3,773,2"
"Queries: 58116774 (4169.1/s)"
"TCP/UDP: 457/58259316"
"Answer > 0: 18236428 (1308.2/s)"
"A: 15664900"
"AAAA: 119999"
"TXT Source: 3"
"TXT Version: 3"
"PTR IPv4/IPv6: 8/0"
"NS DNS-01: 147"
"Blocked: 13421"
1.0.0.127.in-addr.arpa. → 127-0-0-1.sslip.io.), the second, IPv6 PTR queries[Status] A status of “build failing” rarely means the system is failing. It’s more often an indication that when the servers were last checked (currently every six hours), the CI (continuous integration) server had difficulty reaching one of the three sslip.io name servers. That’s normal. [connection timed out]
DNS runs over UDP which has no guaranteed delivery, and it’s not uncommon for the packets to get lost in transmission. DNS clients are programmed to seamlessly query a different server when that happens. That’s why DNS, by fiat, requires at least two name servers (for redundancy). From IETF (Internet Engineering Task Force) RFC (Request for Comment) 1034:
A given zone will be available from several name servers to insure its availability in spite of host or communication link failure. By administrative fiat, we require every zone to be available on at least two servers, and many zones have more redundancy than that.
[fake news] TLS certificates generated with nip.io/sslip.io and Let's Encrypt/ZeroSSL are valid, private, and secure, and can be issued via the HTTP-01 challenge for each individual hostname, contrary to what you might find on the Brave browser or Google search, which sometimes mistakenly regurgitate information from 2015 when, during a one-week period, sslip.io published the private key to its wildcard certificate (the certificate was quickly revoked). sslip.io no longer maintains a wildcard certificate, so any warnings about the security of the wildcard certificate are moot.