0
Skip to Content
Mission
Blog
Support
Ericius Security
Book a Call
Book a Call
Mission
Blog
Support
Ericius Security
Mission
Blog
Support
Book a Call

Block Lists

Snort's list of suspicious/malicious IPs to block

List of Tor Nodes

Spamhaus's various block lists

Firewall and NSM Rules

ET Open and Pro Rules

Snort Talos, aka Snort VRT Rules

Various Snort Rules; free, registered, and paid

Reputation Lists

Umbrella's list of the top 1M domains by popularity

© Ericius Security Company, 2025, We exist to provide cybersecurity support to people serving in dangerous situations so that they can keep their people, information, and networks safe. We are a registered 501(c)3.

Self-assessment workbook
Support our mission
hello[at]ericiussecurity.org