Cybersecurity Marketplace

Connect best-in-class cyber intelligence to elevate your security stack. Access free and paid subscriptions with ThreatBlockr®

Premium Integrations

Commercial
Cyjax logo
Commercial
Cyjax logo
Cyjax
Cyjax’s mission is to be the preeminent supplier of threat intelligence for enterprises, SMEs and governments around the world. Established in 2012, Cyjax has built a reputation for producing world-class cyber threat intelligence across a broad range of sectors. Learn More
Commercial
Intel471 logo
Commercial
Intel471 logo
Intel 471
Intel 471 is the premier provider of cybercrime intelligence for leading intelligence, security, and fraud teams. Its adversary intelligence is focused on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate, and plan cyber-attacks. Its malware intelligence leverages its adversary intelligence and underground capabilities to provide timely data and context on malware and adversary infrastructure. Learn More
Commercial
Commercial
Malware Patrol
Malware Patrol specializes in real-time threat intelligence that protects enterprise users and valuable assets. The highly refined and continuously updated indicators identify malware/ransomware samples and distribution points, command and control (C2) servers, phishing sites, DGAs, crypto-miners and other threats. Learn More
Commercial
Proofpoint logo
Commercial
Proofpoint logo
Proofpoint
A premium threat feed provided by Proofpoint ET Intelligence, the industry’s most timely and accurate source of threat intelligence. Dedicated threat researchers and analytics systems at Proofpoint ET Labs provide 100% originally sourced threat intelligence on malware delivery, command and control, botnets, credential phishing, ransomware and coin-mining, attack spread and exploit kits. Learn More
Commercial
Bambenek Consulting logo
Commercial
Bambenek Consulting logo
Bambenek Consulting
Well-Fed Threat Intelligence is produced by Bambenek Consulting, LTD. Bambenek is a leading cybersecurity threat intelligence and data science firm led by industry veteran John Bambenek. Bambenek’s Well-Fed Intelligence products are used by thousands of organizations all over the world to better protect themselves from cyber threats. Learn More

Free Integrations

SOARs
Free
Siemplify Logo
SOARs
Free
Siemplify Logo
Siemplify
This integration enables users of Siemplify's SOAR platform to automatically integrate IP and domain indicators into the ThreatBlockr platform. Learn More
Commercial
Free
Transparent DomainTools logo
Commercial
Free
Transparent DomainTools logo
DomainTools
DomainTools is a leader in domain name and DNS-based cyber threat intelligence. ThreatBlockr offers a Domain Hotlist and IP Hotlist powered by DomainTools. These lists protects users from phishing, malware, and spam threats. Learn More
Commercial
Free
Webroot logo
Commercial
Free
Webroot logo
Webroot
Webroot’s BrightCloud IP Reputation Service is powered by the Webroot® Platform, which uses a big data architecture to provide the most comprehensive and accurate threat intelligence available today, including up-to-the-minute intelligence on millions of emerging threats.This intelligence is used to block traffic from TOR nodes, proxies, botnets, and other malicious actors. Learn More
Open Source
Free
BlockList logo
Open Source
Free
BlockList logo
Blocklist.de
Blocklist.de is an open source threat feed that is based on data from servers that are often attacked via SSH-, Mail-Login-, FTP-, Webserver- and other services. Blocklist.de sees more than 70,000 attacks every 12 hours in real time. Learn More
Open Source
Free
CINS army logo
Open Source
Free
CINS army logo
CINS Army
The CINS Army List is a subset of the CINS Active Threat Intelligence and is based on activity from Sentinel IPS customers. It consists of IP addresses that have poor scores and have not yet been identified by the cybersecurity community as being malicious. Learn More
Open Source
Free
Emerging Threats multicolored logo
Open Source
Free
Emerging Threats multicolored logo
Emerging Threats Block IPs
This is an open source block list that includes spam nets identified by Spamhaus, Top Attackers listed by DShield and Abuse.ch. Learn More
Open Source
Free
Emerging Threats Logo
Open Source
Free
Emerging Threats Logo
Emerging Threats Compromised IPs
This open source block list consists of hosts that are known to be compromised by bots, phishing sites, etc, or known to be spewing hostile traffic. These are significantly infected and hostile hosts. Learn More
Open Source
Free
Feodo Tracker logo
Open Source
Free
Feodo Tracker logo
Feodo Tracker
Feodo Tracker is an open source block list representing botnet C&C servers associated with the Feodo malware family (Dridex, Emotet/Heodo). Learn More
Open Source
Free
Talos logo
Open Source
Free
Talos logo
Talos
Provided by Cisco Talos Intelligence Group, the IP Blacklist is automatically updated every 15 minutes and contains a list of known malicious network threats that are flagged on all Cisco Security Products. Learn More
Government
Free
CISA DHS logo
Government
Free
CISA DHS logo
DHS CISA
This list comes from the Department of Homeland Security’s Cyber Information Sharing and Collaboration Program (CISCP) and consists of malicious IP indicators that have been vetted by DHS security analysts. Learn More
Government
Free
State of Missouri flag logo
Government
Free
State of Missouri flag logo
State of Missouri SOC
A list of malicious IPs provided by the State of Missouri’s Office of Cyber Security. This list is managed and vetted by their SOC analysts as they investigate incidents. The hosts within these lists are actively blocked within the states enterprise security stack and should be practically free of false positives. More often than not, these hosts are unknown to major security vendors at the time of the addition to the blacklists and could provide you minutes/hours of additional protection within your security defenses. Learn More
Web Services
Free
DocuSign logo
Web Services
Free
DocuSign logo
DocuSign Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for DocuSign’s e-signature service. Learn More
Web Services
Free
Fastly logo
Web Services
Free
Fastly logo
Fastly Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Fastly's CDN. Learn More
Web Services
Free
GitHub logo
Web Services
Free
GitHub logo
Github Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for GitHub services. Learn More
Web Services
Free
Google logo
Web Services
Free
Google logo
Google Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Google services like G Suite. Learn More
Web Services
Free
Mailchimp logo
Web Services
Free
Mailchimp logo
Mailchimp Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Mailchimp’s marketing platform service. Learn More
Web Services
Free
Solarwinds Pingdom logo
Web Services
Free
Solarwinds Pingdom logo
Solarwinds Pingdom Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for Pingdom servers that are used to measure website availability and performance. Learn More
Web Services
Free
SurveyMonkey logo
Web Services
Free
SurveyMonkey logo
SurveyMonkey Integration with ThreatBlockr
An automated allowed list consisting of known good IPs for SurveyMonkey. Learn More
Web Services
Free
Zoom logo
Web Services
Free
Zoom logo
Zoom Integration with ThreatBlockr
An automated list of known IPs for Zoom that users can enable as an automated allowed list or an automated blocklist. Learn More
Enthusiastic Employee working on computer

Want to learn more about
the ThreatBlockr® platform?