Skip to end of banner
Go to start of banner

IP Addresses for Allow Lists

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

In most cases you should not need to configure an allow list for the GTP Services. However, if your having issues with connectivity to some GTP services you should add the following IPs to your firewall allow list. We’ve included IPs for GTP Services as well as those used for our service providers: Microsoft Azure and Auth0. In all cases we use a minimum of TLS 1.2 and port 443.

Inbound Calls

When you are connecting to our services the following IP addresses can be used:

GTP Services

20.98.185.36, 20.84.170.215, 20.120.40.221, 20.88.172.28, 20.99.130.203, 20.99.206.94, 13.85.198.174, 20.88.236.39

Auth0

Our Auth0 domain does not support a static IP at this time. If you firewall has the ability to allow by host name use gtpservices.auth0.com.

Microsoft Azure

20.40.229.4

Outbound Responses

When you are receiving a response from our services the following ip addresses can be used:

GTP Services

52.182.220.128/29, 20.124.136.112/29, 20.99.167.136/29, 52.153.223.92/30, 20.97.84.32/28, 52.153.255.236/30, 20.120.40.221, 20.99.130.203, 13.85.198.174, 13.85.185.196, 20.99.206.94, 20.97.84.32/28, 20.88.236.39, 20.84.170.215, 20.98.185.36

Auth0

35.167.74.121, 35.166.202.113, 35.160.3.103, 54.183.64.135, 54.67.77.38, 54.67.15.170, 54.183.204.205, 35.171.156.124, 18.233.90.226, 3.211.189.167, 18.232.225.224, 34.233.19.82, 52.204.128.250, 3.132.201.78, 3.19.44.88, 3.20.244.231

Microsoft Azure

20.40.229.4

  • No labels