Azure Blob storage account may have this setting enabled in Networking to limit access only to specific IP ranges, for example belonging only to your organization:

Public network access -> Enabled from selected virtual networks and IP addresses.

If you want in addition to access the blobs/files in storage with Power Automate, you would need to whitelist the Power Automate IPs, otherwise when trying to use Power Automate connectors for Azure Blob Storage you will see the following error:

{
    "error": {
        "code": "DynamicInvocationFailed",
        "message": "The dynamic invocation request failed with error",
        "status": 403,
        "message": "AuthorizationFailure\r\nclientRequestId: 2c8242fe-9607-4808-b93b-cc01a5223de5",
        "error": {
            "message": "AuthorizationFailure"
        },
        "source": "azureblob-ne.azconn-ne-002.p.azurewebsites.net"
    }
}

Find Power Automate region

Ref. learn.microsoft.com/en-us/power-automate/regions-overview

Go to admin.powerplatform.microsoft.com -> Environments -> Your Env -> Details table -> Region

In my case the region is Europe.

Find Service tag names associated with your region

Ref. learn.microsoft.com/en-us/connectors/common/outbound-ip-addresses#power-platform

Requests from Power Platform use IP addresses or service tags that depend on the region and the environment in which the app or flow is located

All service tags associated with a region must be allow-listed - regardless of the location of the target resource

For Europe, the service tags are:

  • AzureConnectors.NorthEurope
  • AzureConnectors.WestEurope

Find IP addresses behind service tags

Ref. learn.microsoft.com/en-us/azure/virtual-network/service-tags-overview#discover-service-tags-by-using-downloadable-json-files

You can download JSON files that contain the current list of service tags together with IP address range details. These lists are updated and published weekly. Locations for each cloud are: Azure Public

Go to Azure Public -> click Download to get the JSON file -> search in JSON for your relevant service tags.

For AzureConnectors.NorthEurope:

{
    "name": "AzureConnectors.NorthEurope",
    "id": "AzureConnectors.NorthEurope",
    "properties": {
        "changeNumber": 8,
        "region": "northeurope",
        "regionId": 17,
        "platform": "Azure",
        "systemService": "AzureConnectors",
        "addressPrefixes": [
            "13.69.171.0/32",
            "13.69.227.208/28",
            "13.69.231.192/27",
            "20.82.159.224/32",
            "20.82.224.59/32",
            "20.82.225.129/32",
            "20.82.226.52/32",
            "20.82.226.163/32",
            "20.82.246.112/28",
            "20.93.81.75/32",
            "52.146.138.32/27",
            "52.178.150.68/32",
            "94.245.91.93/32",
            "2603:1020:5:402::180/122"
        ],
        "networkFeatures": [
            "API",
            "NSG",
            "UDR",
            "FW"
        ]
    }
}

For AzureConnectors.WestEurope:

{
    "name": "AzureConnectors.WestEurope",
    "id": "AzureConnectors.WestEurope",
    "properties": {
        "changeNumber": 9,
        "region": "westeurope",
        "regionId": 18,
        "platform": "Azure",
        "systemService": "AzureConnectors",
        "addressPrefixes": [
            "13.69.64.208/28",
            "13.69.71.192/27",
            "20.82.14.39/32",
            "20.82.15.2/32",
            "20.86.93.32/27",
            "20.86.93.64/28",
            "20.103.131.1/32",
            "20.103.132.139/32",
            "20.103.158.245/32",
            "20.103.159.225/32",
            "20.126.241.238/32",
            "20.126.243.151/32",
            "40.91.208.65/32",
            "52.174.88.118/32",
            "52.174.180.160/32",
            "137.117.161.181/32",
            "2603:1020:206:402::180/122",
            "2603:1020:206:403::1c0/122"
        ],
        "networkFeatures": [
            "API",
            "NSG",
            "UDR",
            "FW"
        ]
    }
}

Add all IPs from addressPrefixes to Firewall -> Address range in Azure Storage -> Networking and you are good to go.

Alternatively, same IPs can be found here www.azurespeed.com/Information/AzureIpRangesByService