Skip to content

Community-curated list of currently active malicious IP addresses identified in targeted attacks. Use this blocklist to improve network monitoring, strengthen firewall defenses and enhance your overall security posture against ongoing threats.

Notifications You must be signed in to change notification settings

amitambekar-510/Malicious-IP-Threat-List

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Malicious-IP-Threat-List

Community-curated list of currently active malicious IP addresses identified in targeted attacks. Use this blocklist to improve network monitoring, strengthen firewall defenses and enhance your overall security posture against ongoing threats.

Statistics

Update of the Malicious-IP List on 2026-01-24 09:15 IST

Total Malicious IP's 142850

πŸ“œ Usage and Guidance πŸ“œ

πŸ“œ How to Use This Threat List πŸ“œ This list is provided in the best interest of network security and operational resilience. Implementing a block on these IPs will strengthen your overall defense posture and ensure the betterment, safety and resilience of your environment against ongoing threats.

  1. Direct Integration for Blocking: You can refer to this public file (e.g., Malicious-IP-Threat-List) to directly integrate and add these IPs to your block lists across all your firewalls and other security devices where IP blocking is possible within your environment.

  2. Cross-Check and Verification: Strongly Recommended: Before mass implementation, cross-check the provided IP list against your internal network logs and existing trusted connections. This ensures you do not inadvertently block legitimate traffic relevant to your specific environment.

  3. Prompt Blocking: Promptly blocking the verified malicious IPs on your network is a crucial step to contain active threat campaigns and prevent potential infiltration.

  4. Security Enhancement: Performing this action is strongly recommended to enhance your network security posture significantly, reduce noise from alerts and improve overall resilience against ongoing threats.

Note: This activity is optional, though performing it will certainly benefit your overall security improvement efforts and strengthen your protection measures. Use this data responsibly and always ensure it aligns with your organization's security policies.

🀝 Contribution and Feedback 🀝 Suggesting Improvements As this list is based on long-term personal practice and experience, I am always open to betterment options! If you have suggestions for:

  1. Improving the list format (e.g., using STIX, MISP, or other formats).

  2. Suggestions for automation or integration scripts.

  3. Identifying false positives or expired threats.

About

Community-curated list of currently active malicious IP addresses identified in targeted attacks. Use this blocklist to improve network monitoring, strengthen firewall defenses and enhance your overall security posture against ongoing threats.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published