FireHOL IP Lists

Websitehttps://iplists.firehol.org/
CategoryThreat Intelligence

FireHOL IP Lists is a collection of over 85 IP blocklists aggregated from security researchers, honeypot operators, and threat intelligence organizations worldwide. The lists are organized by threat type, covering abuse, attacks, malware, anonymizers, and more. We use FireHOL data as a comprehensive IP reputation source on robtex.com and rbls.org, showing which specific security feeds have flagged an IP address.

Source:FireHOL IP Lists

What is FireHOL IP Lists?

FireHOL started as a Linux firewall management tool, but the IP Lists project grew into one of the most widely used open-source threat intelligence aggregations available. The project collects, categorizes, and redistributes blocklists from dozens of independent sources, each with its own detection methodology and focus area.

The lists span multiple threat categories:

  • abuse.ch - Ransomware trackers, malware distribution, botnet C2
  • Blocklist.de - Fail2ban reports from thousands of servers worldwide
  • Emerging Threats - Proofpoint's open threat intelligence feeds
  • DShield - SANS Internet Storm Center's aggregated firewall logs
  • AlienVault OTX - Open Threat Exchange community indicators
  • Spamhaus DROP/EDROP - Networks hijacked for spam and malware
  • BruteForceBlocker - SSH and authentication attack sources
  • Bambenek - C2 infrastructure tracked by security researcher

Each source list is maintained independently, with its own update frequency, retention policy, and detection criteria. FireHOL categorizes these lists by threat level (from level 1, which is safe for production blocking, through level 4, which is more aggressive and may include false positives). This categorization helps security teams decide which lists to apply in their firewall rules.

The project also provides historical data and statistics on list sizes, update frequencies, and overlap between sources.

How We Use This Data

On IP lookup and reputation pages across robtex.com and rbls.org, we check each IP against all imported FireHOL source lists. Rather than showing a single "listed/not listed" result, we display which specific source lists within FireHOL have flagged the IP. This granularity matters because an IP appearing only on a single aggressive list is very different from one flagged by multiple high-confidence sources.

The threat category information helps users understand the nature of the threat. An IP flagged by abuse.ch ransomware trackers suggests different risks than one flagged by BruteForceBlocker. Network administrators can use this context to decide on appropriate response actions.

We import the full set of FireHOL lists into our database, with regular updates to track additions and removals as threat landscapes shift.

FAQ

What do the FireHOL levels (1-4) mean?
Level 1 lists have very low false positive rates and are considered safe for production firewall blocking. Level 2 is suitable for most environments with slightly higher false positive risk. Level 3 and 4 are more aggressive and may flag legitimate IPs, so they are better suited for monitoring and alerting rather than automatic blocking. On robtex.com and rbls.org, we show all levels but display the level so you can assess confidence.
Why might an IP appear on some FireHOL lists but not others?
Each source list has different detection methods, geographic focus, and threat specialization. An SSH brute-force scanner might appear on Blocklist.de and BruteForceBlocker but not on abuse.ch malware lists. A malware distribution server might appear on abuse.ch but not on spam-focused lists. Multiple listings across different categories indicate a broadly malicious IP.
How current is FireHOL data?
Individual source lists within FireHOL update at different frequencies, ranging from hourly to daily. Some lists like DShield and Blocklist.de update very frequently based on real-time reports. Others like Spamhaus DROP update less often but cover long-term threats. We import updates regularly to keep our data aligned with upstream sources.