ELLIO: Community Threat List

Free version for personal non-commercial use.

Starting December 2024, legacy links to Community Threat List will be discontinued.
Starting September 2024, every user has to access the Community Threat List using a personalized link.
Make sure to request yours at request@ellio.tech.

Calling all homelabers:

Use ELLIO: Community Threat List, totally for free

Hey there, tech folks!

As a part of our tech community, we're giving homelabers and tech enthusiasts a free
community version of ELLIO: IP Feed for non-commercial use. Enjoy!

The Community ELLIO: IP Feed is an external dynamic threat list, consisting of known malicious IP addresses anticipated to pose potential threats to your network in the near future. It also includes known benign scanners and IP addresses of actors with unknown intent. Compared to the
ELLIO: Threat List, community version is not tailored to the network inventory of your perimeter.

Although the update frequency for the Community Threat List is delayed by 24 hours compared to our commercial offerings, and it is not tailored to the network inventory of your perimeter, it still provides exceptional protection compared to other open IP threat lists/feeds.

Please make sure to check the Terms and Conditions for ELLIO: Community Threat List
here.

Download link to the Community ELLIO: Threat List

For access to ELLIO: Community Threat List, please reach out at request@ellio.tech.

ELLIO Community Feed

ELLIO: Threat List. An IP blocklist that works

Trend Down Icon PNG

Low false-positive rate
of 0.02%

Global network of sensors icon

100.000 - 250.000
IP addresses

Automatic updates
daily

ELLIO compared to open IP lists

Comparison of ELLIO with other blocklists

Interest in a threat list tailored to my network perimeter?

The Community ELLIO: Threat List is a free version of the ELLIO: Threat list, an external threat list tailored to each company's perimeter, with automatic updates every 5 minutes or even in real-time.
More about ELLIO: Threat List
Partnering with the education sector

Are you a university, research lab, or another educational institution?

Reach out to us today!

How we help with IP address filtering issues

CHANGING IP ADDRESSES

How ELLIO asists | By using our sensor network, we constantly monitor internet activities and analyze behavioral patterns within them. This enables us to selectively filter and prioritize essential traffic whenever required. We possess the capability to detect and filter both regular and exploit-driven traffic originating from IP addresses, including those that have not been linked to any malicious activities before.

BOTNETS

How ELLIO asists | Botnets, which commonly consist of numerous compromised devices with fluctuating IP addresses, can pose challenges for conventional IP filtering techniques. However, dynamic lists offer firewalls the flexibility to adapt their rules and filter traffic by leveraging real-time data, including recognized botnet IPs and behavioral patterns.

FALSE POSITIVES

How ELLIO asists | For SIEM solution users, we assist in reducing false positives by filtering out random, insignificant internet noise from severe, targeted attacks, while ensuring that authentic traffic remains uninterrupted. This increases the effectiveness of firewall rules and reduces the influx of irrelevant incidents reported to your SIEM solution.

Global network of sensors icon

CHANGING IP ADDRESSES

Many attackers aim to avoid getting blacklisted by consistently changing their IP address. Criminals may use multiple addresses, enabling them to switch if one gets blocked. These alterations also increase the difficulty of identifying attackers, resulting in less successful detection
Botnet icon

BOTNETS

Attackers commonly leverage massive botnets comprising thousands to millions of compromised end users or IoT devices. These botnets, often rented as a service on the dark web, involve a high volume of frequently changing IP addresses. Traditional IP filtering is ineffective against such attacks.
Real-time data processing

FALSE POSITIVES

False positives are a significant challenge. Today's security systems generate too many alerts, making it difficult for teams to identify and respond to actual threats in a timely manner. Approximately a third of all cybersecurity alerts are determined to be false positives, leading to a huge waste of resources to investigate problems that don’t actually exist. Alert overload can quickly cause major problems such as high staff turnover, low productivity, and financial loss.

Explore more

Summer hot savings
you don’t want to miss.

Discover limited-time prices for Summer 2024.

Discover limited-time
prices for July 2024.

Check out Summer Offer