Channel | Publish Date | Thumbnail & View Count | Actions |
---|---|---|---|
| 2025-02-28 19:18:18 | ![]() 317 Views |
This week, we tackled an issue from a Blazor developer struggling to retrieve the real client IP address when their Blazor Server app was deployed.
The Problem:
HttpContext.Connection.RemoteIpAddress returns internal, non-routable IPs when running:
Locally (::1 or 127.0.0.1)
In Docker (172.17.x.x)
On Azure App Service or Container Apps (100.x.x.x) due to proxies & load balancers
The Solution:
To get the actual client’s IP address:
1️⃣ Use the X-Forwarded-For Header
Many cloud providers & proxies add this header to preserve the real IP.
2️⃣ Enable ForwardedHeadersOptions in Program.cs
Configures ASP.NET to use the real IP from X-Forwarded-For.
3️⃣ Ensure WebSockets is Enabled in Azure App Service
Prevents SignalR fallback issues that might hide IP details.
4️⃣ Use AddDataProtection() in Azure
Ensures encryption keys sync across multiple instances.
Watch the full deep dive & see the working fix in action!
Have you faced this issue? Drop your thoughts below!
Subscribe for more Blazor tips & .NET deep dives!
Get Started Today – Free 30 Day Trial
http://dxpr.es/NUGET
http://dxpr.es/FREE-TRIAL
Pricing and Online Demos
http://dxpr.es/BUY
http://dxpr.es/DEMOS
We Are Here to Help
http://dxpr.es/SUPPORT
Follow DevExpress on Social Media
http://dxpr.es/FACEBOOK
http://dxpr.es/TWITTER
http://dxpr.es/BLOGS
Review Customer Testimonials
http://dxpr.es/TESTIMONIALS
http://dxpr.es/MARKETPLACE
#DevExpress, #devexpress_blazor #blazor #microsoft #carlfranklin #Jefffritz #Blazor #DotNet #CSharp #WebDevelopment #Microsoft #Azure #Networking #BlazorServer #SignalR
Please take the opportunity to connect and share this video with your friends and family if you find it useful.