Created on
01-22-2026
01:58 AM
Edited on
01-22-2026
01:59 AM
By
Jean-Philippe_P
| Description | This article describes specific Fortinet-owned IP addresses used by the FortiSandbox Cloud SaaS service. It explains why these addresses might appear in web server logs or WAF alerts as sources of unauthorized traffic. |
| Scope | FortiSandbox Cloud. |
| Solution |
WAF Alerts. External security logs or Web Application Firewalls (WAF) sometimes detect traffic originating from Fortinet-owned IP addresses used for cloud security services. These specific IP addresses belong to the FortiSandbox Cloud SaaS infrastructure. Below is an example of the logs:
Why Traffic is Generated. The FortiSandbox Cloud service receives file submissions from global customers to scan for malicious activity. During the analysis process, files are executed in a secure sandbox environment. If a submitted file contains instructions to communicate with an external URL or web server, the sandbox environment allows this outgoing internet access to record the behavior of the file. Consequently, if a file under analysis contains references to a specific domain, the FortiSandbox environment attempts to reach that server.
Observed Traffic Characteristics. Based on reported cases, the traffic exhibits the following traits:
Analysis of findings. The presence of this traffic does not indicate a breach or a direct attack from Fortinet. Instead, it signifies that a file being analyzed by the FortiSandbox service is attempting to interact with the target web server. This often happens when:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.