Suspicious IP address? Check IP address with ELLIO Free IP Lookup!

Recon & Mass Exploitation Research

Threat research on reconnaissance and mass exploitation activity from ELLIO. Read the latest threat news and defense analysis.

Page 2 of 3

Hero image
#BSides #Events #Network Fingerprints
Technical Articles

Video: How to capture real value from network fingerprinting in practice

Learn practical tips for deploying JA4, JA3, and MuonFP fingerprints in your security operations. Get expert insights from Vlad Iliushin and discover how to unlock their full defensive value.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
Product Updates

MITRE ATT&CK® framework now integrated into ELLIO Threat Platform

Transform your threat investigations with the ELLIO Threat Intelligence Platform. Now with MITRE ATT&CK threat mapping and advanced fingerprint analysis.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
#Tutorial
Technical Articles

IP Blockling on FortiGate 7.2.0/7.4.0 using ELLIO

This article gives you a simple, step-by-step guide to set up an external IP blocklist and firewall rules on FortiGate 7.2.0/7.4.0. Discover why adding advanced ELLIO Blocklists to your FortiGate v. 7.2.0/7.4.0 is a great way to boost its protection, and how easy it is to set up.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
#Network Fingerprints
Technical Articles

IP Blocking vs TCP Fingerprint Blocking: How to Use and Combine Them

Learn how combining Threat Intelligence-based IP blocking and TCP fingerprinting enhances network security by disrupting attacker reconnaissance.

Vlad IliushinELLIO Threat Research Lab
Vlad Iliushin, ELLIO Threat Research Lab ·
Hero image
Technical Articles

Managing blocklists using a central platform (part 3)

Learn how SOCs, NOCs and MSSPs are leveraging centralized blocklist management to reduce false positives and simplify security management.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
Technical Articles

Managing blocklists using a central platform (part 2)

Explore 8 essential steps for building and deploying effective IP blocklists with the Blocklist Management Platform.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
Technical Articles

Managing blocklists using a central platform (part 1)

Learn how blocklist management platforms empower SOCs and NOCs. Streamline processes, minimize errors, and enhance network security.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
#Tutorial
Technical Articles

ELLIO IP Blocklist for Check Point NGFW: 3 million unwanted connections blocked in 45 days 

Follow this step-by-step guide to set up IP blocking on Check Point firewalls using ELLIO Blocklists, enhancing your network protection. This tutorial provides a quick and easy way to get ELLIO up and running on your Check Point NGFW within minutes, including how to test it using free trial ...

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·
Hero image
#Tutorial
Technical Articles

ELLIO for IP blocking on OPNsense

A practical guide how to quickly set up IP blocking on OPNsense firewall by using advanced ELLIO IP blocklists for filtering active malicious IP addresses.

ELLIO Threat Research Lab
ELLIO Threat Research Lab ·