If you manage routing, firewall policy, or upstream filtering, here are the latest Spamhaus DROP (Do Not Route or Peer) listings ‡️‡️

πŸ‘‰ SBL694187 – https://check.spamhaus.org/results/?query=SBL694187
πŸ‘‰ SBL693984 – https://check.spamhaus.org/results/?query=SBL693984
πŸ‘‰ SBL693981 – https://check.spamhaus.org/results/?query=SBL693981
πŸ‘‰ SBL693980 – https://check.spamhaus.org/results/?query=SBL693980
πŸ‘‰ SBL693942 – https://check.spamhaus.org/results/?query=SBL693942
πŸ‘‰ SBL693939 – https://check.spamhaus.org/results/?query=SBL693939
πŸ‘‰ SBL693938 – https://check.spamhaus.org/results/?query=SBL693938
πŸ‘‰ SBL693937 – https://check.spamhaus.org/results/?query=SBL693937
πŸ‘‰ SBL693936 – https://check.spamhaus.org/results/?query=SBL693936

These are IP netblocks that shouldn’t be trusted ❌

If you’re not automatically ingesting DROP and/or ASN-DROP, now’s the time to fix that:
πŸ‘‰ https://www.spamhaus.org/blocklists/do-not-route-or-peer/

Be proactive. Block the worst of the worst IP traffic.

#ThreatIntel #SOC #ThreatHunting #BGP #NetworkSecurity #BulletproofHosting #Infosec

Don't Route Or Peer Lists (DROP) | Use with firewalls & BGP

A free advisory β€œdrop all traffic” list containing the most dangerous IP ranges - available to anyone who wants to add this layer of protection.

The Spamhaus Project