Back button image

Allowlisting and LogMeIn Rescue

This article gives guidance to Rescue Administrators.

We suggest you allow the GoToURLs listed below to ensure that GoTo services are able to connect.

Important: For information about SaaS products offered by GetGo, Inc., a subsidiary of GoTo, Inc., visit this page.
  • *.logmein.com, *.logmein.eu - GoTo's main site
    Note: The *.logmein.eu site is not eligible for secure testing.
  • *.logmeinrescue.com, *.logmeinrescue.eu - Powers the LogMeIn Rescue service
  • rescue-[companyId].*.logmein.com - Part of the LogMeIn Rescue service
  • ctrl.*.logmeinrescue.com - Part of the LogMeIn Rescue service
  • *.logmeinrescue-enterprise.eu, *.logmeinrescue-enterprise.com - Powers account-specific LogMeIn Rescue features (should only be allowlisted by enterprise accounts)
  • *.logmein-gateway.com- Part of the LogMeIn Rescue service
  • update-cdn.logmeinrescue.com- Powers updates to LogMeIn Rescue
  • *.logmein123.com, *.logmein123.eu - Site used to connect to a LogMeIn Rescue technician
  • *.123rescue.com - Site used to connect to a LogMeIn Rescue technician
  • *.support.me - Site used to connect to a LogMeIn Rescue technician
  • *.rescuemobile.eu - Site used to connect to a LogMeIn Rescue technician
  • *.rescuemobile.com - Site used to connect to a LogMeIn Rescue technician
  • *.oty.com - Site used to connect to a LogMeIn Rescue technician
  • *.logmeininc.com -GoTo's corporate website
  • *.remoteview.logmein.com, *.remoteview.logmein.eu - Powers Nextgen media-specific features for Rescue Lens and Rescue 7.50 and above.
  • *.turn.console.logmeinrescue.com, *.turn.console.logmeinrescue.eu - Powers Nextgen media-specific features for Rescue Lens and Rescue 7.50 and above.
  • translation.logmeinrescue.com - Powers translation services.
  • *.lastpass.com -GoTo's leading password management solution for personal and enterprise use and for two factor authentication service
Note: This list includes sub-domains for these domains, so it is advisable to use wildcard rules wherever possible when you allowlist or block any GoTo service on your network. The client-to-host connection uses peer-to-peer connections, encrypted within a 256-bit AES tunnel. The services themselves communicate using port 443 (HTTPS/SSL) and port 80, so no additional ports need to be opened within a firewall.

GoTo Admin Allowlisting Requirements for Billing Admins

The following allowlisting settings are required for Billing Admins only.

Domain Purpose URLs
*.goto.com GoTo Products Homepage
  • https://admin.goto.com
  • https://api.goto.com
  • https://feedback.goto.com
*.getgo.com Backend Services & APIs
  • https://iam.servers.getgo.com
  • https://commerce.servers.getgo.com
  • https://avatars.servers.getgo.com
Category URLs
Authentication & Admin
  • https://admin.logmeininc.com
  • https://authentication.logmeininc.com
Analytics & Monitoring
  • https://api.segment.io
  • https://cdn.segment.com
  • https://api-js.mixpanel.com
  • https://o173976.ingest.us.sentry.io
User Experience & Feedback
  • https://cdn.pendo.io
  • https://siteintercept.qualtrics.com
Communication
  • https://api.jive.com
Accessibility
  • https://cdn.disability.illinois.edu
Tip: To test whether network settings are blocking connection to GoTo Admin services, try accessing GoTo Admin outside of your company network.

IP Ranges

It is recommended to use wildcard rules whenever possible while allowlisting or blocking any GoTo services on your network as sub-domains of the domains listed above are included. Also, the client-to-host connection uses peer-to-peer connections, encrypted within a 256-bit AES tunnel.

Use of IP ranges instead of domain names for the firewall configuration is discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, creating additional maintenance for your network. These changes are necessary to continue to provide the maximum performance for our GoTo products. Maintenance and failover events within our infrastructure may cause you to connect to servers within any of the ranges.

If your firewall includes a content or application data scanning filter, this may cause a block or latency, which would be indicated in the log files for the filter. To address this problem, verify that the domains or IP ranges will not be scanned or filtered by specifying exception domains or IP ranges.

We do not recommend explicit IP allowlisting of GoTo ranges. If URL allowlisting is not feasible, refer to the list of GoTo IP addresses.

GoTo IP Ranges

CIDR Notation Numeric IP Range Netmask Notation
111.221.57.0/24 111.221.57.0 - 111.221.57.255 111.221.57.0 255.255.255.0
176.34.175.41/32 176.34.175.41 - 176.34.175.41 176.34.175.41 255.255.255.255
176.34.201.99/32 176.34.201.99 - 176.34.201.99 176.34.201.99 255.255.255.255
18.202.5.124/32 18.202.5.124 - 18.202.5.124 18.202.5.124 255.255.255.255
212.118.234.0/24 212.118.234.0 - 212.118.234.254 212.118.234.0 255.255.254.0
34.254.76.175/32 34.254.76.175 - 34.254.76.175 34.254.76.175 255.255.255.255
34.255.156.182/32 34.255.156.182 - 34.255.156.182 34.255.156.182 255.255.255.255
46.137.118.35/32 46.137.118.35 - 46.137.118.35 46.137.118.35 255.255.255.255
52.19.6.219/32 52.19.6.219 - 52.19.6.219 52.19.6.219 255.255.255.255
52.209.158.52/32 52.209.158.52 - 52.209.158.52 52.209.158.52 255.255.255.255
52.210.249.247/32 52.210.249.247 - 52.210.249.247 52.210.249.247 255.255.255.255
52.49.175.18/32 52.49.175.18 - 52.49.175.18 52.49.175.18 255.255.255.255
54.154.227.245/32 54.154.227.245 - 54.154.227.245 54.154.227.245 255.255.255.255
54.170.31.64/32 54.170.31.64 - 54.170.31.64 54.170.31.64 255.255.255.255
54.217.134.155/32 54.217.134.155 - 54.217.134.155 54.217.134.155 255.255.255.255
54.220.196.131/32 54.220.196.131 - 54.220.196.131 54.220.196.131 255.255.255.255
54.246.98.107/32 54.246.98.107 - 54.246.98.107 54.246.98.107 255.255.255.255
54.73.215.233/32 54.73.215.233 - 54.73.215.233 54.73.215.233 255.255.255.255
54.75.205.153/32 54.75.205.153 - 54.75.205.153 54.75.205.153 255.255.255.255
63.251.34.0/24 63.251.34.0 - 63.251.34.255 63.251.34.0 255.255.255.0
63.251.46.0/23 63.251.46.0 - 63.251.47.255 63.251.46.0 255.255.254.0
63.33.145.40/32 63.33.145.40 - 63.33.145.40 63.33.145.40 255.255.255.255
64.74.103.0/24 64.74.103.0 - 64.74.103.255 64.74.103.0 255.255.255.0
64.74.17.0/24 64.74.17.0 - 64.74.17.255 64.74.17.0 255.255.255.0
64.74.18.0/23 64.74.18.0 - 64.74.19.255 64.74.18.0 255.255.254.0
64.94.18.0/24 64.94.18.0 - 64.94.18.255 64.94.18.0 255.255.255.0
64.94.46.0/23 64.94.46.0 - 64.94.47.255 64.94.46.0 255.255.254.0
64.95.128.0/23 64.95.128.0 - 64.95.129.255 64.95.128.0 255.255.254.0
66.150.108.0/24 66.150.108.0 - 66.150.108.255 66.150.108.0 255.255.255.0
67.217.80.0/23 67.217.80.0 - 67.217.81.255 67.217.80.0 255.255.254.0
69.25.20.0/23 69.25.20.0 - 69.25.21.255 69.25.20.0 255.255.254.0
69.25.247.0/24 69.25.247.0 - 69.25.247.255 69.25.247.0 255.255.255.0
79.125.88.65/32 79.125.88.65 - 79.125.88.65 79.125.88.65 255.255.255.255
95.172.70.0/24 95.172.70.0 - 95.172.70.255 95.172.70.0 255.255.255.0

Rescue Lens and Rescue Nextgen media

CIDR Notation Numeric IP Range Netmask Notation
13.232.7.181/32 13.232.7.181 - 13.232.7.181 13.232.7.181 255.255.255.255
13.42.92.190/32 13.42.92.190 - 13.42.92.190 13.42.92.190 255.255.255.255
175.41.141.140/32 175.41.141.140 - 175.41.141.140 175.41.141.140 255.255.255.255
18.134.118.217/32 18.134.118.217 - 18.134.118.217 18.134.118.217 255.255.255.255
18.140.137.139/32 18.140.137.139 - 18.140.137.139 18.140.137.139 255.255.255.255
18.158.121.211/32 18.158.121.211 - 18.158.121.211 18.158.121.211 255.255.255.255
18.158.218.2/32 18.158.218.2 - 18.158.218.2 18.158.218.2 255.255.255.255
3.10.62.125/32 3.10.62.125 - 3.10.62.125 3.10.62.125 255.255.255.255
3.108.206.123/32 3.108.206.123 - 3.108.206.123 3.108.206.123 255.255.255.255
3.11.130.196/32 3.11.130.196 - 3.11.130.196 3.11.130.196 255.255.255.255
3.122.32.27/32 3.122.32.27 - 3.122.32.27 3.122.32.27 255.255.255.255
3.230.232.226/32 3.230.232.226 - 3.230.232.226 3.230.232.226 255.255.255.255
43.205.76.185/32 43.205.76.185 - 43.205.76.185 43.205.76.185 255.255.255.255
44.229.217.227/32 44.229.217.227 - 44.229.217.227 44.229.217.227 255.255.255.255
44.232.77.24/32 44.232.77.24 - 44.232.77.24 44.232.77.24 255.255.255.255
50.17.158.207/32 50.17.158.207 - 50.17.158.207 50.17.158.207 255.255.255.255
52.13.255.230/32 52.13.255.230 - 52.13.255.230 52.13.255.230 255.255.255.255
52.28.148.85/32 52.28.148.85 - 52.28.148.85 52.28.148.85 255.255.255.255
52.35.84.247/32 52.35.84.247 - 52.35.84.247 52.35.84.247 255.255.255.255
52.54.244.43/32 52.54.244.43 - 52.54.244.43 52.54.244.43 255.255.255.255
54.146.34.187/32 54.146.34.187 - 54.146.34.187 54.146.34.187 255.255.255.255
54.185.112.207/32 54.185.112.207 - 54.185.112.207 54.185.112.207 255.255.255.255
54.189.249.52/32 54.189.249.52 - 54.189.249.52 54.189.249.52 255.255.255.255
54.204.126.154/32 54.204.126.154 - 54.204.126.154 54.204.126.154 255.255.255.255
54.227.77.39/32 54.227.77.39 - 54.227.77.39 54.227.77.39 255.255.255.255
54.255.100.96/32 54.255.100.96 - 54.255.100.96 54.255.100.96 255.255.255.255
54.255.48.58/32 54.255.48.58 - 54.255.48.58 54.255.48.58 255.255.255.255
65.0.112.174/32 65.0.112.174 - 65.0.112.174 65.0.112.174 255.255.255.255

Nextgen media

Note: When you start a next-gen media streaming session, the applet initially attempts to connect to a streaming server allocated from the AWS pool. However, if the connection can’t be established (for example, due to strict firewall rules set by the customer), the session switches back to a turn server and proceeds through it.
  • *.remoteview.logmein.com
  • *.turn.console.gotoassist.com
  • For networks explicitly filtering outbound destination ports and protocols, the following ports are used on Rescue Lens side and Rescue Nextgen media: 15000 (UDP traffic) or 443 (TCP traffic) for Rescue media sessions.
Tip: It is recommended that you allow UDP traffic through port 15000. Restricting the traffic to TCP may decrease the quality of the Rescue media support experience.
Important: The use of IP ranges instead of domain names for the firewall configuration is discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, thus creating additional maintenance for your network. If URL allowlisting is not feasible, refer to the list of IP address in this document.

Third-party IP Ranges

You must also allowlist ranges for these third-party services:

Chat Monitor

Needed only if you are using the Chat monitoring feature.
CIDR Notation Numeric IP Range Netmask Notation
18.193.134.63/32 18.193.134.63 - 18.193.134.63 18.193.134.63 255.255.255.255
3.74.125.23/32 3.74.125.23 - 3.74.125.23 3.74.125.23 255.255.255.255

Chat Translation

Needed only if you are using the "Chat translation" feature.
CIDR Notation Numeric IP Range Netmask Notation
3.74.147.62/32 3.74.147.62 - 3.74.147.62 3.74.147.62 255.255.255.255
3.77.125.1/32 3.77.125.1 - 3.77.125.1 3.77.125.1 255.255.255.255
34.231.59.195/32 34.231.59.195 - 34.231.59.195 34.231.59.195 255.255.255.255
52.0.111.168/32 52.0.111.168 - 52.0.111.168 52.0.111.168 255.255.255.255

Email domains

For email invitations and correspondences from us and the GoTo software, we recommend allowing the following email domains through your email's spam and allowlist filters.

  • @m.logmein.com
  • @t.logmein.com
  • @logmeinrescue.com
  • @logmein.com
  • @m.lastpass.com
  • @t.lastpass.com

GoTo server / Data Center IP addresses for use in firewall configurations

The following IP ranges may be used by any GoTo product, so they should all be added to your allowlist. See below for additional GoTo product-specific ranges. This list is also available in JSON format at https://goto-ipblocks.live.gtc.goto.com/.

Equivalent specifications in 3 common formats

Assigned Range by Block Numeric IP Address Range Netmask Notation CIDR Notation
Block 1 216.115.208.0 – 216.115.223.255 216.115.208.0 255.255.240.0 216.115.208.0/20
Block 2 216.219.112.0 – 216.219.127.255 216.219.112.0 255.255.240.0 216.219.112.0/20
Block 3 67.217.64.0 – 67.217.95.255 67.217.64.0 255.255.224.0 67.217.64.0/19
Block 4 173.199.0.0 – 173.199.63.255 173.199.0.0 255.255.192.0 173.199.0.0/18
Block 5 206.183.100.0 – 206.183.103.255 206.183.100.0 255.255.252.0 206.183.100.0/22
Block 6 68.64.0.0 – 68.64.31.255 68.64.0.0 255.255.224.0 68.64.0.0/19
Block 7 23.239.224.0 – 23.239.255.255 23.239.224.0 255.255.224.0 23.239.224.0/19
Block 8 158.120.16.0 - 158.120.31.255 158.120.16.0 255.255.240.0 158.120.16.0/20
Block 9 202.173.24.0 – 202.173.31.255 202.173.24.0 255.255.248.0 202.173.24.0/21
Block 10 78.108.112.0 – 78.108.127.255 78.108.112.0 255.255.240.0 78.108.112.0/20
Block 11 185.36.20.0 – 185.36.23.255 185.36.20.0 255.255.252.0 185.36.20.0/22
Block 12 188.66.40.0 – 188.66.47.255 188.66.40.0 255.255.248.0 188.66.40.0/21
Block 13 45.12.196.0 – 45.12.199.255 45.12.196.0 255.255.252.0 45.12.196.0/22
Block 14 162.250.60.0 – 162.250.63.255 162.250.60.0 255.255.252.0 162.250.60.0/22
Block 15 199.36.248.0 – 199.36.251.255 199.36.248.0 255.255.252.0 199.36.248.0/22
Block 16 199.87.120.0 – 199.87.123.255 199.87.120.0 255.255.252.0 199.87.120.0/22
Block 17 103.15.16.0 – 103.15.19.255 103.15.16.0 255.255.252.0 103.15.16.0/22
Block 18 64.74.17.0 – 64.74.17.255 64.74.17.0 255.255.255.0 64.74.17.0/24
Block 19 64.74.18.0 – 64.74.19.255 64.74.18.0 255.255.254.0 64.74.18.0/23
Block 20 64.74.103.0 – 64.74.103.255 64.74.103.0 255.255.255.0 64.74.103.0/24
Block 21 64.94.18.0 – 64.94.18.255 64.94.18.0 255.255.255.0 64.94.18.0/24
Block 22 64.94.46.0 – 64.94.47.255 64.94.46.0 255.255.254.0 64.94.46.0/23
Block 23 64.95.128.0 – 64.95.129.255 64.95.128.0 255.255.254.0 64.95.128.0/23
Block 24 66.150.108.0 – 66.150.108.255 66.150.108.0 255.255.255.0 66.150.108.0/24
Block 25 69.25.20.0 – 69.25.21.255 69.25.20.0 255.255.254.0 69.25.20.0/23
Block 26 69.25.247.0 – 69.25.247.255 69.25.247.0 255.255.255.0 69.25.247.0/24
Block 27 95.172.70.0 – 95.172.70.255 95.172.70.0 255.255.255.0 95.172.70.0/24
Block 28 111.221.57.0 – 111.221.57.255 111.221.57.0 255.255.255.0 111.221.57.0/24
Article last updated: 28 February, 2025
Chatbot Icon