In most cases you should not need to configure an allow list for the GTP Services. However, if your having issues with connectivity to some GTP services you should add the following IPs to your firewall allow list. We’ve included IPs for GTP Services as well as those used for our service providers: Microsoft Azure and Auth0. In all cases we use a minimum of TLS 1.2 and port 443.
Inbound Calls
When you are connecting to our services the following IP addresses can be used:
GTP Services
20.98.185.36, 20.84.170.215, 20.120.40.221, 20.88.172.28, 20.99.130.203, 20.99.206.94, 13.85.198.174, 20.88.236.39
Auth0
Our Auth0 domain does not support a static IP at this time. If you firewall has the ability to allow by host name use gtpservices.auth0.com.
Microsoft Azure
20.40.229.4
Outbound Responses
When you are receiving a response from our services the following ip addresses can be used:
GTP Services
52.182.220.128/29, 20.124.136.112/29, 20.99.167.136/29, 52.153.223.92/30, 20.97.84.32/28, 52.153.255.236/30, 20.120.40.221, 20.99.130.203, 13.85.198.174, 13.85.185.196, 20.99.206.94, 20.97.84.32/28, 20.88.236.39, 20.84.170.215, 20.98.185.36
Auth0
35.167.74.121, 35.166.202.113, 35.160.3.103, 54.183.64.135, 54.67.77.38, 54.67.15.170, 54.183.204.205, 35.171.156.124, 18.233.90.226, 3.211.189.167, 18.232.225.224, 34.233.19.82, 52.204.128.250, 3.132.201.78, 3.19.44.88, 3.20.244.231
Microsoft Azure
20.40.229.4