These lists can be imported into any firewall that accept blocklists with standalone ip addressess (x.x.x.x) and ranges (x.x.x.x-y.y.y.y).
Keep polling interval at 15 minutes or higher and use https if possible.
|List name||Entries||Last update||Recommended usage||Description|
|Emerging Threats: Known Compromised Hosts||1488||2018-02-22 02:02||Incoming||This ruleset is compiled from a number of sources. These are not your everyday infected and sending a bit of spam hosts,
these are significantly infected and hostile hosts. Read more
|TOR exit nodes||918||2018-02-22 02:04||Incoming||A list of known TOR exit nodes|
|BruteforceBlocker||1487||2018-02-22 02:02||Incoming||See http://danger.rulez.sk/index.php/bruteforceblocker|
|Blocklist.de All||34232||2018-02-22 02:03||Incoming||Blocklist.de all list contains IP addresses that have attacked one of our customers/servers in the last 48 hours.|
|Talos||1609||2018-02-22 02:03||Incoming||Talos is a list from Cisco Talos that contains known malicious network threats.|
|Dshield||20||2018-02-22 02:02||Incoming||Dshield.org recommended block list|
|Malware Domain List||1023||2018-02-22 02:06||Outgoing||See: http://www.malwaredomainlist.com|
|SSL Abuse IP list||139||2018-02-22 02:07||Outgoing||SSLBL 30 days block list. https://sslbl.abuse.ch/blacklist/|
|Zeus IP blocklist||103||2018-02-22 02:08||Outgoing||abuse.ch ZeuS IP blocklist "BadIPs" (excluding hijacked sites and free hosting providers). https://zeustracker.abuse.ch/blocklist.php|
Check Point R80.10+Download and unpack r80-0.2.tar (changelog) on your gateways in expert mode. Follow the instructions in the README file. The following lists are available at this time: etknown, tor, bruteforce, talos, blocklistde, malwaredomainlist, sslabuse, zeus.
Installation on Check Point R77.30:Download and unpack cpdbl-0.61.tar (readme, changelog) on your gateways in expert mode.
Run 'sh install.sh' in the cpdbl-installer directory and you should be set to use cpdbl.sh