What should I allow on my firewall for GoToAssist Remote Support v4?
Learn what ports, IP addresses, domains, etc. need to be allowed on your firewall for your service to successfully connect and work with GoTo.
Subscribe to notifications in our Customer Community to be kept up to date on any changes to this important information.
Required Email Domains
- @goto.com
- @logmein.com
- customerservice@s.logmein.com
- @care.gotoassist.com
- @m.logmein.com
- @t.logmein.com
Required Ports
- Outbound TCP 443
- Outbound TCP 80
- STUN/TURN - TCP and UDP 3489 — GoTo Resolve and GoToAssist v5 only
Required Domains
Universal Domains | Additional Product Specific Domains | |||
---|---|---|---|---|
GoToAssist Remote Support v.4 | GoToAssist Remote Support v.5 | GoToAssist SeeIt | GoToAssist Corporate | |
Required: *.goto.com *.getgo.com *.ingest.sentry.io *.logmein.com *.logmeininc.com |
Required: *.gotoassist.com *.fastsupport.com *.cloudfront.net helpme.net *.expertcity.com
Note: The following domains will be required starting February 19, 2023.
cdn.goto.com cdn.getgo.com getgo.com |
Required: *.gotoassist.com *.fastsupport.com helpme.net |
Required: *.gotoassist.com *.tokbox.com static.opentok.com enterprise.opentok.com api.opentok.com anvil.opentok.com hlg.toxbox.com |
Required: *.gotoassist.com *.gotoassist.me *.gotoassist.at *.gofastchat.com *.desktopstreaming.com
Note: The following domains will be required starting February 19, 2023.
cdn.goto.com cdn.getgo.com getgo.com |
Optional: N/A |
Optional: *.google-analytics.com *.filepicker.io *.wootric.com |
Optional: *.segment.io *.segment.com *.amplitude.com |
Optional: N/A |
Optional: N/A |
GoTo server / Data Center IP addresses for use in firewall configurations
The following IP ranges may be used by any GoTo product, so they should all be added to your allowlist. See below for additional GoTo product-specific ranges. This list is also available in JSON format at https://goto-ipblocks.live.gtc.goto.com/.
Equivalent specifications in 3 common formats
Assigned Range by Block | Numeric IP Address Range | Netmask Notation | CIDR Notation |
---|---|---|---|
Block 1 | 216.115.208.0 – 216.115.223.255 | 216.115.208.0 255.255.240.0 | 216.115.208.0/20 |
Block 2 | 216.219.112.0 – 216.219.127.255 | 216.219.112.0 255.255.240.0 | 216.219.112.0/20 |
Block 3 | 67.217.64.0 – 67.217.95.255 | 67.217.64.0 255.255.224.0 | 67.217.64.0/19 |
Block 4 | 173.199.0.0 – 173.199.63.255 | 173.199.0.0 255.255.192.0 | 173.199.0.0/18 |
Block 5 | 206.183.100.0 – 206.183.103.255 | 206.183.100.0 255.255.252.0 | 206.183.100.0/22 |
Block 6 | 68.64.0.0 – 68.64.31.255 | 68.64.0.0 255.255.224.0 | 68.64.0.0/19 |
Block 7 | 23.239.224.0 – 23.239.255.255 | 23.239.224.0 255.255.224.0 | 23.239.224.0/19 |
Block 8 | 158.120.16.0 - 158.120.31.255 | 158.120.16.0 255.255.240.0 | 158.120.16.0/20 |
Block 9 | 202.173.24.0 – 202.173.31.255 | 202.173.24.0 255.255.248.0 | 202.173.24.0/21 |
Block 10 | 78.108.112.0 – 78.108.127.255 | 78.108.112.0 255.255.240.0 | 78.108.112.0/20 |
Block 11 | 185.36.20.0 – 185.36.23.255 | 185.36.20.0 255.255.252.0 | 185.36.20.0/22 |
Block 12 | 188.66.40.0 – 188.66.47.255 | 188.66.40.0 255.255.248.0 | 188.66.40.0/21 |
Block 13 | 45.12.196.0 – 45.12.199.255 | 45.12.196.0 255.255.252.0 | 45.12.196.0/22 |
Block 14 | 162.250.60.0 – 162.250.63.255 | 162.250.60.0 255.255.252.0 | 162.250.60.0/22 |
Block 15 | 199.36.248.0 – 199.36.251.255 | 199.36.248.0 255.255.252.0 | 199.36.248.0/22 |
Block 16 | 199.87.120.0 – 199.87.123.255 | 199.87.120.0 255.255.252.0 | 199.87.120.0/22 |
Block 17 | 103.15.16.0 – 103.15.19.255 | 103.15.16.0 255.255.252.0 | 103.15.16.0/22 |
Block 18 | 64.74.17.0 – 64.74.17.255 | 64.74.17.0 255.255.255.0 | 64.74.17.0/24 |
Block 19 | 64.74.18.0 – 64.74.19.255 | 64.74.18.0 255.255.254.0 | 64.74.18.0/23 |
Block 20 | 64.74.103.0 – 64.74.103.255 | 64.74.103.0 255.255.255.0 | 64.74.103.0/24 |
Block 21 | 64.94.18.0 – 64.94.18.255 | 64.94.18.0 255.255.255.0 | 64.94.18.0/24 |
Block 22 | 64.94.46.0 – 64.94.47.255 | 64.94.46.0 255.255.254.0 | 64.94.46.0/23 |
Block 23 | 64.95.128.0 – 64.95.129.255 | 64.95.128.0 255.255.254.0 | 64.95.128.0/23 |
Block 24 | 66.150.108.0 – 66.150.108.255 | 66.150.108.0 255.255.255.0 | 66.150.108.0/24 |
Block 25 | 69.25.20.0 – 69.25.21.255 | 69.25.20.0 255.255.254.0 | 69.25.20.0/23 |
Block 26 | 69.25.247.0 – 69.25.247.255 | 69.25.247.0 255.255.255.0 | 69.25.247.0/24 |
Block 27 | 95.172.70.0 – 95.172.70.255 | 95.172.70.0 255.255.255.0 | 95.172.70.0/24 |
Block 28 | 111.221.57.0 – 111.221.57.255 | 111.221.57.0 255.255.255.0 | 111.221.57.0/24 |
IPv6 addresses space
Assigned by Block | Classless Inter-Domain Routing (CIDR) format |
---|---|
Block 1 | 2606:CB00::/32 |
Block 2 | 2a0e:bd00::/29 |
Additional IP addresses required for using GoToAssist Remote Support v.4
Allow these additional IP addresses if your firewall is configured to allow list by IP range rather than domains:
- 52.23.109.85
- 34.194.20.78
- 54.224.37.110
- 52.205.68.9
- 3.221.98.226
- 54.157.60.139
- 3.218.246.74
- 52.55.102.23
Required IP Addresses
It is recommended to use wild card rules whenever possible while allow listing or blocking any GoTo services on your network as sub-domains of the domains listed above are included. Also, the client-to-host connection uses peer-to-peer connections, encrypted within an HTTPS tunnel where data is encrypted with AES-256 symmetric cipher.
Use of IP ranges instead of domain names for the firewall configuration is discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, creating additional maintenance for your network. These changes are necessary to continue to provide the maximum performance for our products. Maintenance and failover events within our infrastructure may cause you to connect to servers within any of the ranges.
If your firewall includes a content or application data scanning filter, this may cause a block or latency, which would be indicated in the log files for the filter. To address this problem, verify that the domains or IP ranges will not be scanned or filtered by specifying exception domains or IP ranges. If your security policy requires you to specify explicit domain or IP ranges, then configure your firewall exceptions for outbound TCP ports 8200, 443, and 80 as well as UDP ports 8200 and 1853 for the GoTo domains or IP ranges, including those of our third-party provider networks.
Third-party provider IP Ranges
- IP ranges for the content delivery network (CDN) — Used by GoTo Resolve and GoToAssist RS v.5
- IP ranges for other services (audio, video and screen sharing) — Used by GoTo Resolve and GoToAssist RS v.5
Fixed IP addresses
ap-southeast-1 | Virginia-us-east-1 | Oregon-us-west-2 | eu-central-1 | eu-central-1 (EU-only environment) | London (eu-west-2) | Mumbai (ap-south-1) |
---|---|---|---|---|---|---|
175.41.141.140 54.255.100.96 18.140.137.139 54.255.48.58 |
54.227.77.39 54.204.126.154 50.17.158.207 3.230.232.226 52.54.244.43 54.146.34.187 |
54.185.112.207 52.13.255.230 44.232.77.24 44.229.217.227 54.189.249.52 52.35.84.247 |
3.122.32.27 18.158.218.2 18.158.121.211 52.28.148.85 |
18.198.174.137 18.198.147.201 18.192.225.252 18.198.176.236 |
13.42.92.190 18.134.118.217 3.10.62.125 3.11.130.196 |
3.108.206.123 13.232.7.181 43.205.76.185 65.0.112.174 |
Data Centers
We scale our services with third-party cloud and carrier networks for improved performance. To ensure continuous up-time, we also maintain data centers in the following regions:
- U.S.: Nevada, Virginia, Michigan
- Global: Germany, Australia
- Global Public Cloud (including, but not limited to): California, Oregon, Virginia, Singapore, Australia, Japan
- Content Delivery Public Cloud (including, but not limited to): California, Washington, Texas, Indiana, Missouri, New Jersey, Brazil, United Kingdom, Amsterdam, Germany, France, Italy, Hong Kong, Japan, Singapore