Clean traffic, backed by automation and threat intel.
With ELLIO Blocklist Automation, manage all blocklists and custom IP rules across your firewalls from a single, centralized console - without manual syncing, blind spots, or overblocking.
Custom Blocklist Configuration
9 rulesFirewalls
5 targetsCustom Blocklist Configuration
9 rulesFirewalls
5 targetsOne place for all your blocklists.
Bring all your threat feeds and blocklists into one place. ELLIO automatically downloads and updates them based on your conditions.
Set up exact rules your environment needs.
Create custom blocklists and IP rulesets by combining ELLIO Threat Lists with external feeds. Deploy across one or more firewalls of different vendors, with policies adapted to each asset's exposure and role.
Protect legitimate business traffic by default.
Automatically allow legitimate crawlers, monitoring bots, and business-critical services. Their IPs are kept up to date, so they are never accidentally blocked.
Full visibility and monitoring.
Monitor all blocklists and IP rules from one place. See what's deployed on each firewall, track updates, catch errors early, and clearly see where every rule applies.
Stop attacks early.
Block only active malicious IPs and unwanted traffic. Block exploitation attempts before vendor detections appear, giving extra time to patch critical systems.
Keep critical traffic flowing.
Define which services are blocked or always allowed, and where. ELLIO maintains a continuously updated database of IPs for business and cloud services (Google, Microsoft, AWS, and more), ensuring your firewall rules stay accurate as cloud infrastructure changes.
Continuously updated IP intelligence
Block what matters, when it matters.
Block only active malicious traffic - as soon as it appears and without disrupting legitimate business traffic. With ELLIO Cyber Deception, you also block exploitation attempts before vendor detections exist, gaining extra time to patch critical systems.
Malicious blocked, legitimate passed
| ELLIO Blocklist Automation | |
|---|---|
| GENERAL | |
| Self-service web portal | |
| Multi-tenancy & multi-firewall support | |
| Activity history & audit-ready logging | |
| KEY FEATURES | |
| Access to ELLIO Threat Lists | |
| Add and organize multisource external threat feeds and blocklists | |
| Create custom blocklists | |
| Create custom IP rulesets | |
| Block or allow cloud, CDN, Saas traffic (granular or broad) | |
| Block or allow scanning services (Shodan, Censys, Cortex Xpanse, Driffnet, BinaryEdge) | |
| Access to continuously updated service IP database | |
| Customize deployment/s to each perimeter, firewall | |
| Deploy consistent policies across all firewall | |
| ELLIO THREAT LISTS | |
| ELLIO Threat List MAX | 250,000 - 750,000 active malicious IPs |
| ELLIO Threat List RDP | Protects remote access services |
| ELLIO Recon IP Lists | Current IPs from scanning services |
| INTEGRATION | |
| Firewall & NGFW compatibility | |
| Full programmatic control via API | |
Save resources by stopping attacks before they become costly.
Stop attacks early, during recon, before mass exploitation campaigns hit your network. Save time and resources.
Gain extra time to patch critical vulnerabilities.
Block exploitation attempts before vendor detections exist, gaining extra time to patch critical systems.
See what's urgent by cutting noise at the perimeter.
Cut the noise from XDR, IPS, IDS, and other tools by fortifying your perimeter.
Ensure both security and smooth traffic.
Prevent overblocking and delayed response to new malicious IPs. Automate blocking and keep business traffic flowing.
Save resources by stopping attacks before they become costly.
Stop attacks early, during recon, before mass exploitation campaigns hit your network. Save time and resources.
Gain extra time to patch critical vulnerabilities.
Block exploitation attempts before vendor detections exist, gaining extra time to patch critical systems.
See what's urgent by cutting noise at the perimeter.
Cut the noise from XDR, IPS, IDS, and other tools by fortifying your perimeter.
Ensure both security and smooth traffic.
Prevent overblocking and delayed response to new malicious IPs. Automate blocking and keep business traffic flowing.


