0
Skip to Content
Ericius Security
About
Support
Blog
Resources
Login Account
Book a Call
Ericius Security
About
Support
Blog
Resources
Login Account
Book a Call
About
Support
Blog
Resources
Login Account
Book a Call

Block Lists

Snort's list of suspicious/malicious IPs to block

List of Tor Nodes

Spamhaus's various block lists

Firewall and NSM Rules

ET Open and Pro Rules

Snort Talos, aka Snort VRT Rules

Various Snort Rules; free, registered, and paid

Reputation Lists

Umbrella's list of the top 1M domains by popularity

© Ericius Security Company, 2024, We exist to provide cybersecurity support to people serving in dangerous situations so that they can keep their people, information, and networks safe. We are a registered 501(c)3.

Download self-assessment workbook
Support our mission
hello [at] ericiussecurity [dot] org