CP Dynamic Block Lists


These lists can be imported into any firewall that accept blocklists with standalone ip addressess (x.x.x.x) and ranges (x.x.x.x-y.y.y.y).
Keep polling interval at 15 minutes or higher and use https if possible.
List name Entries Last update Recommended usage Description
Emerging Threats: Known Compromised Hosts 663 2018-09-19 02:04 Incoming This ruleset is compiled from a number of sources. These are not your everyday infected and sending a bit of spam hosts,
these are significantly infected and hostile hosts. Read more
TOR exit nodes 900 2018-09-19 02:06 Incoming A list of known TOR exit nodes
BruteforceBlocker 658 2018-09-19 02:03 Incoming See http://danger.rulez.sk/index.php/bruteforceblocker
Blocklist.de All 38785 2018-09-19 02:06 Incoming Blocklist.de all list contains IP addresses that have attacked one of our customers/servers in the last 48 hours.
Talos 1419 2018-09-19 02:05 Incoming Talos is a list from Cisco Talos that contains known malicious network threats.
Dshield 20 2018-09-19 02:09 Incoming Dshield.org recommended block list
Malware Domain List 1010 2018-09-19 02:09 Outgoing See: http://www.malwaredomainlist.com
SSL Abuse IP list 62 2018-09-19 02:09 Outgoing SSLBL 30 days block list. https://sslbl.abuse.ch/blacklist/
Zeus IP blocklist 104 2018-09-19 02:10 Outgoing abuse.ch ZeuS IP blocklist "BadIPs" (excluding hijacked sites and free hosting providers). https://zeustracker.abuse.ch/blocklist.php

Check Point R80.10+

Download and unpack r80-0.2.tar (changelog) on your gateways in expert mode. Follow the instructions in the README file. The following lists are available at this time: etknown, tor, bruteforce, talos, blocklistde, malwaredomainlist, sslabuse, zeus.




Installation on Check Point R77.30:

Download and unpack cpdbl-0.61.tar (readme, changelog) on your gateways in expert mode.
Run 'sh install.sh' in the cpdbl-installer directory and you should be set to use cpdbl.sh




All use of CPDBLs services is at your own risk.
This service is provided by Fnutt Consulting and is in no way affiliated with Check Point Software Technologies.
Although Fnutt Consulting has taken reasonable precautions to ensure the service is safe, Fnutt Consulting cannot
accept responsibility for any loss or damage arising from the use of this service.
Contact