5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
This article outlines a threat intelligence project offering blocklists derived from various OSINT sources, honeypots, and C2 trackers. Users can download blocklists categorized by confidence levels and utilize them to enhance network security. It encourages community contributions for ongoing improvement and accuracy.
If you do, here's more
Blocklists for cybersecurity threats have been updated to be served from Cloudflare R2, enhancing their global delivery speed and reducing latency. Users should now use the provided download links instead of raw GitHub URLs. The blocklists aggregate threat intelligence from various open-source intelligence (OSINT) sources, honeypot networks, and command-and-control (C2) trackers. They include confidence-based tiers that allow users to select blocklists based on the reliability of the sources reporting the threats.
The blocklists are categorized into tiers: High, Medium, and Low confidence, with specific thresholds for each tier. For example, the "High Limited" tier includes IPs confirmed malicious by five or more independent sources. Whitelist protection is in place to exclude ranges associated with popular content delivery networks like Cloudflare and Akamai, reducing the chances of false positives. The project actively tracks over 50 threat actors, including various malware strains and botnets, providing users with a comprehensive view of the current threat landscape.
Users can also access curated lists to minimize false positives, including lists of legitimate IPs removed from blocklists and critical infrastructure IPs. The article emphasizes the importance of contributions from the community to improve the accuracy and effectiveness of these threat intelligence feeds. They invite security researchers, network administrators, and cybersecurity enthusiasts to participate in various ways, such as submitting verified indicators of compromise (IOCs) or reporting issues with the blocklists. This collaborative effort aims to strengthen network security for individuals, small and medium-sized businesses, and larger enterprises.
Questions about this article
No questions yet.