Dynamic threat blocklists
Protect your perimeter with dynamic blocklists. Automatic updates ensure your firewall blocks the latest threats without manual intervention.
Everything you need to protect your infrastructure and users
Works with Palo Alto, Fortinet, Check Point, and more.
Blocklists update every 5-15 minutes automatically.
Malicious IPs including C2, scanners, and botnets.
Phishing, malware, and spam domains.
Choose specific threat categories to block.
Easily whitelist false positives from your dashboard.
How security teams use this tool
Block known bad actors at the network edge.
Stop malware from communicating with C2 servers.
Block access to phishing and scam sites.
Document threat blocking for audit requirements.
Traditional firewall rules rely on static blocklists that quickly become outdated. Attackers constantly rotate infrastructure, register new domains, and move to new IP addresses. A blocklist from yesterday may miss today's threats. Our dynamic blocklists update automatically with new threat indicators, ensuring your firewall is always blocking the latest malicious infrastructure. No manual updates, no gaps in protection.
Our blocklists work with the firewalls you already have: - **Palo Alto Networks**: External Dynamic Lists (EDL) format with automatic refresh - **Fortinet FortiGate**: External blocklist feeds for FortiOS - **Check Point**: Threat prevention feeds and custom IOC lists - **Cisco**: Compatible with Cisco FTD and ASA external feeds - **Sophos**: Direct integration with Sophos Firewall - **Generic HTTP**: Standard text format for any firewall supporting URL-based blocklists Integration typically takes minutes - just point your firewall at our feed URL.
Not all threats are equal, and not all networks have the same needs. Choose the blocklists relevant to your environment: - **Malware Distribution**: Domains and IPs hosting malware payloads and droppers - **Command & Control (C2)**: Infrastructure used by malware to receive instructions - **Phishing**: Fake login pages and credential theft sites - **Cryptomining**: Mining pools and cryptojacking scripts - **Spam Infrastructure**: Mail servers and domains associated with spam campaigns - **Scanner/Attackers**: IPs actively scanning for vulnerabilities Mix and match categories or use our comprehensive "all threats" list.
Blocking legitimate traffic is worse than blocking nothing. Our blocklists are curated for accuracy: - **Multiple Source Validation**: We require multiple independent sources before listing - **Confidence Scoring**: Only high-confidence indicators make it to blocklists - **Active Monitoring**: We continuously verify that listed indicators are still malicious - **Fast Delisting**: When false positives are reported, we investigate and remove quickly - **Whitelist Support**: Maintain your own exceptions for known-good infrastructure Our false positive rate is below 0.01% across millions of indicators.
Learn more from our security research blog
Join thousands of security teams using isMalicious to protect their infrastructure.