Public list of SecureLine endpoint IPs?

Hi,

we’re developing an industrial machine with a web interface accessible from the local network as well as from the Internet (reverse-proxied through our own VPN for various reasons).

For physical safety reasons (preventing work accidents), we do however restrict some features to users in the vicinity of the machine. We do this by checking whether or not the HTTPS connection comes from the local network (as opposed to our VPN range).

Some of our customers use your SecureLine product, which apparently tunnels all connections through your cloud, making them appear as a remote access to our software, which in turn causes it to present the user with the restricted subset of functionality available to remote users.

We’d like to be able to at least show those users a message telling them what the issue is, including a link to documentation on how to temporarily disable the VPN tunnel. We already do this for Apple Private Relay, which is a similar service by Apple and Cloudflare. This is possible because Apple publishes a list of its exit IP ranges used by its Private Relay service. Apple’s list is available at: mask-api (dot) icloud (dot) com (slash) egress-ip-ranges.csv

If such a list is available for Avast SecureLine as well, it would be great if someone could point me at it. Otherwise, I’d appreciate if you could follow Apple’s example of transparency here and make your list of egress endpoints public or otherwise help your customers not run into this issue.