product icon

Allowlisting and GoTo

    If you or your company uses a firewall to restrict network access to only specific websites or software, you will need to allowlist the domain names and IP ranges enlisted here.

    We suggest you allow the GoTo URLs listed below to ensure that GoTo services are able to connect.

    Important: For information about SaaS products offered by GetGo, Inc., a subsidiary of GoTo, Inc., visit this page.
    • *.logmein.com, *.logmein.eu - GoTo's main site
    • *.logmeinusercontent.com and *.browse.logmeinusercontent.com - For files stored and shared using the Pro Files feature
    • *.logmeinrescue.com, *.logmeinrescue.eu - Powers the Rescue service
    • *.logmeinrescue-enterprise.com - Powers account-specific Rescue features (should only be allowlisted by enterprise accounts)
    • *.logmein-gateway.com - Part of the Rescue service
    • *.accounts.logme.in - Site allowing login to GoTo services
    • *.hamachi.cc - Powers the Hamachi service
    • *.internap.net - Powers updates to multiple GoTo products
    • *.internapcdn.net - Powers updates to multiple GoTo products
    • *.LogMeIn123.com, *.LogMeIn123.eu - Site used to connect to a Rescue technician
    • *.123rescue.com - Site used to connect to a Rescue technician
    • *.support.me - Site used to connect to a Rescue technician
    • *.join.me - GoTo's screen sharing service
    • * .logmeininc.com - GoTo's corporate website
    • * .lastpass.com, *.lastpass.eu - GoTo's leading password management solution for personal and enterprise use
    • authentication.logmeininc.com - GoTo's sign-in service
    Remember: For information about SaaS products offered by GetGo, Inc., a subsidiary of GoTo, Inc., visit this page.
    Note: This includes sub-domains for these domains, so it is advisable to use wildcard rules wherever possible when you allowlist or block any GoTo service on your network. The client-to-host connection uses peer-to-peer connections, encrypted within a 256-bit AES tunnel. The services themselves communicate using port 443 (HTTPS/SSL) and port 80, so no additional ports need to be opened within a firewall.
    Specific URLs for Hamachi features
    • Antivirus: lmi-antivirus-live.azureedge.net
    • Application Updates: lmi-appupdates-live.azureedge.net

    IP Ranges

    It is recommended to use wildcard rules whenever possible while allowlisting or blocking any GoTo services on your network as sub-domains of the domains listed above are included. Also, the client-to-host connection uses peer-to-peer connections, encrypted within a 256-bit AES tunnel.

    Use of IP ranges instead of domain names for the firewall configuration is discouraged unless absolutely necessary because our IP ranges and those of our provider networks need to be periodically audited and modified, creating additional maintenance for your network. These changes are necessary to continue to provide the maximum performance for our GoTo products. Maintenance and failover events within our infrastructure may cause you to connect to servers within any of the ranges.

    If your firewall includes a content or application data scanning filter, this may cause a block or latency, which would be indicated in the log files for the filter. To address this problem, verify that the domains or IP ranges will not be scanned or filtered by specifying exception domains or IP ranges. If your security policy requires you to specify explicit domain or IP ranges, then configure your firewall exceptions for outbound TCP ports 8200, 443, and 80 as well as UDP ports 8200 and 1853 for the GoTo domains or IP ranges, including those of our third-party provider networks.

    We do not recommend explicit IP allowlisting of GoTo ranges. If URL allowlisting is not feasible, refer to the list of GoTo IP addresses.

    GoTo IP Ranges

    CIDR Notation Numeric IP Range Netmask Notation
    63.251.34.0/24 63.251.34.0 - 63.251.34.255 63.251.34.0 255.255.255.0
    63.251.46.0/23 63.251.46.0 - 63.251.47.255 63.251.46.0 255.255.254.0
    64.74.17.0/24 64.74.17.0 - 64.74.17.255 64.74.17.0 255.255.255.0
    64.74.18.0/23 64.74.18.0 - 64.74.19.255 64.74.18.0 255.255.254.0
    64.74.103.0/24 64.74.103.0 - 64.74.103.255 64.74.103.0 255.255.255.0
    64.94.18.0/24 64.94.18.0 - 64.94.18.255 64.94.18.0 255.255.255.0
    64.94.46.0/23 64.94.46.0 - 64.94.47.255 64.94.46.0 255.255.254.0
    64.95.128.0/23 64.95.128.0 - 64.95.129.255 64.95.128.0 255.255.254.0
    66.150.108.0/24 66.150.108.0 - 66.150.108.255 66.150.108.0 255.255.255.0
    67.217.80.0/23 67.217.80.0 - 67.217.81.255 67.217.80.0 255.255.254.0
    69.25.20.0/23 69.25.20.0 - 69.25.21.255 69.25.20.0 255.255.254.0
    69.25.247.0/24 69.25.247.0 - 69.25.247.255 69.25.247.0 255.255.255.0
    95.172.70.0/24 95.172.70.0 - 95.172.70.255 95.172.70.0 255.255.255.0
    111.221.57.0/24 111.221.57.0 - 111.221.57.255 111.221.57.0 255.255.255.0
    212.118.234.0/24 212.118.234.0 - 212.118.234.254 212.118.234.0 255.255.254.0

    Third-party IP Ranges

    You must also allowlist ranges for these third-party services:

    Email Domains

    For email invitations and correspondences from us and the GoTo software, we recommend allowing the following email domains through your email's spam and allowlist filters.

    • @m.join.me
    • @t.join.me
    • @m.logmein.com
    • @t.logmein.com
    • @m.lastpass.com
    • @t.lastpass.com

    GoTo server / Data Center IP addresses for use in firewall configurations

    The following IP ranges may be used by any GoTo product, so they should all be added to your allowlist. See below for additional GoTo product-specific ranges.

    Equivalent specifications in 3 common formats

    Assigned Range by Block Numeric IP Address Range Netmask Notation CIDR Notation
    Block 1 216.115.208.0 – 216.115.223.255 216.115.208.0 255.255.240.0 216.115.208.0/20
    Block 2 216.219.112.0 – 216.219.127.255 216.219.112.0 255.255.240.0 216.219.112.0/20
    Block 3 67.217.64.0 – 67.217.95.255 67.217.64.0 255.255.224.0 67.217.64.0/19
    Block 4 173.199.0.0 – 173.199.63.255 173.199.0.0 255.255.192.0 173.199.0.0/18
    Block 5 206.183.100.0 – 206.183.103.255 206.183.100.0 255.255.252.0 206.183.100.0/22
    Block 6 68.64.0.0 – 68.64.31.255 68.64.0.0 255.255.224.0 68.64.0.0/19
    Block 7 23.239.224.0 – 23.239.255.255 23.239.224.0 255.255.224.0 23.239.224.0/19
    Block 8 158.120.16.0 - 158.120.31.255 158.120.16.0 255.255.240.0 158.120.16.0/20
    Block 9 202.173.24.0 – 202.173.31.255 202.173.24.0 255.255.248.0 202.173.24.0/21
    Block 10 78.108.112.0 – 78.108.127.255 78.108.112.0 255.255.240.0 78.108.112.0/20
    Block 11 185.36.20.0 – 185.36.23.255 185.36.20.0 255.255.252.0 185.36.20.0/22
    Block 12 188.66.40.0 – 188.66.47.255 188.66.40.0 255.255.248.0 188.66.40.0/21
    Block 13 45.12.196.0 – 45.12.199.255 45.12.196.0 255.255.252.0 45.12.196.0/22
    Block 14 162.250.60.0 – 162.250.63.255 162.250.60.0 255.255.252.0 162.250.60.0/22
    Block 15 199.36.248.0 – 199.36.251.255 199.36.248.0 255.255.252.0 199.36.248.0/22
    Block 16 199.87.120.0 – 199.87.123.255 199.87.120.0 255.255.252.0 199.87.120.0/22
    Block 17 103.15.16.0 – 103.15.19.255 103.15.16.0 255.255.252.0 103.15.16.0/22
    Block 18 64.74.17.0 – 64.74.17.255 64.74.17.0 255.255.255.0 64.74.17.0/24
    Block 19 64.74.18.0 – 64.74.19.255 64.74.18.0 255.255.254.0 64.74.18.0/23
    Block 20 64.74.103.0 – 64.74.103.255 64.74.103.0 255.255.255.0 64.74.103.0/24
    Block 21 64.94.18.0 – 64.94.18.255 64.94.18.0 255.255.255.0 64.94.18.0/24
    Block 22 64.94.46.0 – 64.94.47.255 64.94.46.0 255.255.254.0 64.94.46.0/23
    Block 23 64.95.128.0 – 64.95.129.255 64.95.128.0 255.255.254.0 64.95.128.0/23
    Block 24 66.150.108.0 – 66.150.108.255 66.150.108.0 255.255.255.0 66.150.108.0/24
    Block 25 69.25.20.0 – 69.25.21.255 69.25.20.0 255.255.254.0 69.25.20.0/23
    Block 26 69.25.247.0 – 69.25.247.255 69.25.247.0 255.255.255.0 69.25.247.0/24
    Block 27 95.172.70.0 – 95.172.70.255 95.172.70.0 255.255.255.0 95.172.70.0/24
    Block 28 111.221.57.0 – 111.221.57.255 111.221.57.0 255.255.255.0 111.221.57.0/24
    Article last updated: 19 October, 2022