Starting December 2024, legacy links to Community Threat List will be discontinued.
Starting September 2024, every user has to access the Community Threat List using a personalized link. Make sure to request yours at request@ellio.tech.
Hey there, tech folks! As a part of our tech community, we're giving homelabers and tech enthusiasts a free community version of ELLIO: IP Feed for non-commercial use. Enjoy!
The Community ELLIO: IP Feed is an external dynamic threat list, consisting of known malicious IP addresses anticipated to pose potential threats to your network in the near future. It also includes known benign scanners and IP addresses of actors with unknown intent. Compared to the ELLIO: Threat List, community version is not tailored to the network inventory of your perimeter.
Although the update frequency for the Community Threat List is delayed by 24 hours compared to our commercial offerings, and it is not tailored to the network inventory of your perimeter, it still provides exceptional protection compared to other open IP threat lists/feeds.
Please make sure to check the Terms and Conditions for ELLIO: Community Threat List here.
Download link to the Community ELLIO: Threat List
For access to ELLIO: Community Threat List, please reach out at request@ellio.tech.
Interest in a threat list tailored to my network perimeter?
The Community ELLIO: Threat List is a free version of the ELLIO: Threat list, an external threat list tailored to each company's perimeter, with automatic updates every 5 minutes or even in real-time.
How ELLIO asists | By using our sensor network, we constantly monitor internet activities and analyze behavioral patterns within them. This enables us to selectively filter and prioritize essential traffic whenever required. We possess the capability to detect and filter both regular and exploit-driven traffic originating from IP addresses, including those that have not been linked to any malicious activities before.
BOTNETS
How ELLIO asists | Botnets, which commonly consist of numerous compromised devices with fluctuating IP addresses, can pose challenges for conventional IP filtering techniques. However, dynamic lists offer firewalls the flexibility to adapt their rules and filter traffic by leveraging real-time data, including recognized botnet IPs and behavioral patterns.
FALSE POSITIVES
How ELLIO asists | For SIEM solution users, we assist in reducing false positives by filtering out random, insignificant internet noise from severe, targeted attacks, while ensuring that authentic traffic remains uninterrupted. This increases the effectiveness of firewall rules and reduces the influx of irrelevant incidents reported to your SIEM solution.
CHANGING IP ADDRESSES
Many attackers aim to avoid getting blacklisted by consistently changing their IP address. Criminals may use multiple addresses, enabling them to switch if one gets blocked. These alterations also increase the difficulty of identifying attackers, resulting in less successful detection
BOTNETS
Attackers commonly leverage massive botnets comprising thousands to millions of compromised end users or IoT devices. These botnets, often rented as a service on the dark web, involve a high volume of frequently changing IP addresses. Traditional IP filtering is ineffective against such attacks.
FALSE POSITIVES
False positives are a significant challenge. Today's security systems generate too many alerts, making it difficult for teams to identify and respond to actual threats in a timely manner. Approximately a third of all cybersecurity alerts are determined to be false positives, leading to a huge waste of resources to investigate problems that don’t actually exist. Alert overload can quickly cause major problems such as high staff turnover, low productivity, and financial loss.