An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Thanks for reaching out in Microsoft Q&A forum,
Is it expected for Azure platform / SDN internal IPs to appear as intermediate hops in
tracert, even when the effective next hop is a Virtual Network Gateway? Can such IPs represent Azure internal forwarding infrastructure that is not visible via route tables or BGP? Should Network Watcher Next Hop / Effective Routes be considered authoritative over traceroute output for Azure routing validation?
Yes, what we’re observing is expected Azure platform behavior, and there’s no routing misconfiguration here.
It’s completely normal in Azure for private, undocumented IP addresses to show up in tracert/traceroute output, even when Network Watcher confirms the next hop is a Virtual Network Gateway, no NVAs or Azure Firewall exist in the path, and the IP doesn’t appear in UDRs, BGP-propagated routes, or peering configurations. These addresses belong to Azure’s internal Software-Defined Networking (SDN) forwarding infrastructure — the hidden fabric that moves packets between your VM and the logical next hop.
- From a logical perspective, our traffic flow is straightforward: VM > Virtual Network Gateway > Netskope > Internet. However,
tracerouteexposes the physical/SDN forwarding path, which includes Azure’s internal hops: VM > Host vSwitch > Azure SDN fabric router (10.100.50.25) >Gateway stamp > VPN tunnel > Netskope > Internet. - The IP
10.100.50.25is almost certainly an Azure host-level virtual switch, SDN dataplane router, or Virtual Filtering Platform (VFP) hop. These components exist outside customer visibility and control, are not advertised in route tables, BGP, or peering configs, may respond to ICMP (ping/TTL-exceeded) because they process packets in the data plane, and can change dynamically during VM migrations or host updates. - Azure Network Watcher’s Next Hop and Effective Routes tools evaluate the control-plane routing truth your configured system routes, UDRs, and BGP propagations. They tell you where Azure intends to send the traffic, not every internal hop the packet touches along the way.
- In contrast,
tracerouteshows every device that decrements TTL, including Azure’s transient SDN fabric nodes. In Azure’s overlay networking model, logical routing ≠ physical forwarding path, so traceroute can be misleading if used as the primary routing validation tool. For routing validation in Azure, Network Watcher Next Hop and Effective Routes are authoritative, NSG Flow Logs are valid for traffic inspection, whiletracert/tracerouteshould be treated as informational only since it exposes SDN fabric hops. - We’ve confirmed that the unknown private IP (
10.100.50.25) appears in traceroute, responds to ICMP ping from the VM, is absent from all route tables, BGP tables, and peering configs, traffic successfully exits via VPN Gateway to Netskope, and no NVA or firewall is involved. All of these observations are consistent with normal Azure SDN behavior. This isn’t a bug or misrouting it’s simply visibility into Azure’s hidden forwarding fabric.
Continue to trust Network Watcher Next Hop / Effective Routes as the source of truth for routing validation. Treat intermediate private IPs in traceroute as Azure platform infrastructure unless they match your own managed NVA/firewall addresses. No further action is needed unless you observe actual traffic drops, latency spikes, or asymmetric routing issues.
References:
- Diagnose an Azure virtual machine routing problem | Microsoft Learn
- Interoperability in Azure - Data plane analysis | Microsoft Learn
- Tutorial: Diagnose a VM Network Routing Problem - Azure Portal - Azure Network Watcher | Microsoft Learn
Kindly let us know if the above helps or you need further assistance on this issue.
Please do not forget to
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.