Data Products

Blocklists

IP & domain blocklists

Ready-to-use blocklists for firewalls and security tools. Auto-updated every 15 minutes with curated threat data.

1M+
Active IOCs
15min
Updates
8+
Categories
<0.01%
False Positive

Key Features

Everything you need to protect your infrastructure and users

IP Blocklists

Malicious IPs including C2, scanners, and botnets.

Domain Blocklists

Phishing, malware, and spam domains.

Category Filters

Choose specific threat types to block.

Auto-Updates

Lists refresh every 15 minutes automatically.

Multiple Formats

Text, JSON, CSV, and vendor-specific formats.

Size Options

10K, 100K, or 1M entries based on your needs.

Use Cases

How security teams use this tool

Firewall Rules

Block malicious traffic at the perimeter.

DNS Filtering

Block access to malicious domains.

Proxy Filtering

Filter traffic through web proxies.

Email Gateway

Block emails from malicious IPs/domains.

Frequently Asked Questions

What blocklist categories are available?
Malware, C2, phishing, spam, tor exit nodes, VPN/proxy, scanner/crawler, and aggregated "block all" lists.
What formats do you provide?
Plain text (one per line), JSON, CSV, and vendor-specific formats for Palo Alto, Fortinet, and others.
How do I use these with my firewall?
Configure your firewall to pull from our HTTPS endpoint. Most firewalls support external dynamic lists.
Are there size limits?
We provide filtered lists of varying sizes (10K, 100K, 1M entries) to match different firewall capacities.

Ready to Get Started?

Join thousands of security teams using isMalicious to protect their infrastructure.