ThreatBlockr® MSP Partner Program

Fill the gaps and instantly enhance your customer value.

ThreatBlockr®’s simple, scalable platform enables MSPs to instantly improve their customer’s security posture without adding new tools or workloads.

As an MSP partner, you can easily monitor and manage multiple customers and connect ThreatBlockr®’s open threat intelligence solution to any security tool you already use.

Integrations

Open Source
Free
Open Source
Free
Emerging Threats Compromised IPs
This open source block list consists of hosts that are known to be compromised by bots, phishing sites, etc, or known to be spewing hostile traffic. These are significantly infected and hostile hosts. Learn More
Web Services
Free
Web Services
Free
Google Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Google services like G Suite. Learn More
Threat Intel Platforms
Threat Intel Platforms
ThreatSTOP
Our ThreatSTOP integration enables mutual customers to automatically integrate IP and domain indicators from ThreatSTOP into the ThreatBlockr platform. Learn More
Open Source
Free
Open Source
Free
Feodo Tracker
Feodo Tracker is an open source block list representing botnet C&C servers associated with the Feodo malware family (Dridex, Emotet/Heodo). Learn More
Web Services
Free
Web Services
Free
Mailchimp Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Mailchimp’s marketing platform service. Learn More
Threat Intel Platforms
Threat Intel Platforms
TruStar
Our ThreatSTOP integration enables mutual customers to automatically integrate IP and domain indicators from ThreatSTOP into the ThreatBlockr platform. Learn More
Commercial
Commercial
Bambenek Consulting
Well-Fed Threat Intelligence is produced by Bambenek Consulting, LTD. Bambenek is a leading cybersecurity threat intelligence and data science firm led by industry veteran John Bambenek. Bambenek’s Well-Fed Intelligence products are used by thousands of organizations all over the world to better protect themselves from cyber threats. Learn More
Open Source
Open Source
Open DBL Tor List
This list consists of IPs designated as Tor exit nodes. While the Tor network is not malicious itself, bad actors can use it for malicious activities. Learn More
Web Services
Web Services
Microsoft Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Microsoft services. This includes four service areas: Common, Exchange, SharePoint, and Skype. Learn More
SIEMs
SIEMs
Gravwell
ThreatBlockr and Gravwell collaborated to develop the ThreatBlockr Kit for Gravwell. The ThreatBlockr Kit for Gravwell automates the process of integrating ThreatBlockr log data into the Gravwell platform and provides pre-built dashboards that visualize log activity from one or more ThreatBlockr appliances. Learn More
Commercial
Commercial
Cyjax
Cyjax’s mission is to be the preeminent supplier of threat intelligence for enterprises, SMEs and governments around the world. Established in 2012, Cyjax has built a reputation for producing world-class cyber threat intelligence across a broad range of sectors. Learn More
Open Source
Free
Open Source
Free
Talos
Provided by Cisco Talos Intelligence Group, the IP Blacklist is automatically updated every 15 minutes and contains a list of known malicious network threats that are flagged on all Cisco Security Products. Learn More

Become a Partner

Join the Open Threat Intelligence Enforcement Revolution