Access to our data is provided by Spamhaus’ BGP Firewall service. Using our threat intelligence data, via your existing firewall or router, automatically drop connections to and from the worst of the worst IP addresses, including netblocks "hijacked" or leased by professional spam or cyber-crime operations, to IP addresses hosting botnet command and control (C2) servers.
Border Gateway
Protocol (BGP)
Block the worst-of-the-worst at your network perimeter, taking advantage of your existing BGP-capable appliances, including routers and modern firewalls. Our data available via BGP Firewall carries minimal risk of blocking legitimate traffic, given its high certainty of maliciousness.
Low false positives
Only known and verified malicious dedicated and compromised hosts enter our botnet C2 IPs dataset.
Existing router protection
Enhance appliances within your current infrastructure with industry-leading threat data, increasing the value you get from existing hardware.
Reduced attack surface
Stop threats at the network edge, before they touch your broader network infrastructure.
Spamhaus’ BGP Firewall
Why are there two different names for the data?
Our datasets have been supporting users for a very long time. With new users requesting our support, the dataset names are being updated for clearer understanding. We’re documenting two names, for now, to best support all users.
Datasets Included

Use case for BGP

For Edge Protection
Use Spamhaus BGP Firewall to secure your network edge with real-time protection against malicious IPs. Deploy threat intelligence data at the routing level using BGP, and automatically block communications to and from IPs involved in the most dangerous cybercrimes, before they take hold.
Strengthen your perimeter security and build lasting resilience, creating a safer, more secure network.
Eliminate the need to remediate core servers, critical applications, and user machines by stopping threats at the first point of entry, minimizing the attack surface.
Block infected devices within your network from communicating with botnet C2s, stopping data exfiltration and malware progression.
When a high-certainty malicious connection is detected, the router can automatically drop the connection without human intervention - it’s automated edge protection.
Getting started
How to start a free 30-day trial
Simply complete the form and submit. No credit card or payment details are required for the free trial.
What happens next?
Once you’ve completed the form to trial the Border Gateway Protocol Firewall, one of our team will be in touch to get you set up with access.
Need help?
If you have any questions, please add them to the comments on the sign up form. Once you gain access to the data, technical support is available via our Customer Portal.
How can I purchase the data?
During your free trial, you can request a quote in the Customer Portal to get the subscription cost based on your setup. You can also enable trials of additional datasets via the Customer Portal.
System requirements
Technical documentation
How to optimize your network protection with DNS RPZ
Pricing
Ready to start
your free trial?
Get a free 30-day trial of Border Gateway Protocol Firewall. No credit card details required.

Frequently Asked Questions
Who can use BGP Firewall?
Anyone or any network that has the ability to block or filter IP address ranges on their network by using router equipment can use BGP datasets.
Suitable users include Network engineers, Security Operations Center (SOC) Analysts, and anyone who manages their network edge routers or firewalls.
How does BGP Firewall work?
How to integrate Border Gateway Protocol (BGP) datasets
Am I allowed to redistribute BGP datasets?
I don't have router equipment, can I still use BGP Firewall?

Explore more
Data Access
Access our wide variety of DNS Response Policy Zone files to block or redirect access based on your appetite for risk. We provide the data, you set the terms, configurable to your business’ needs and company requirements/policies.
Data Access
Integrate context-rich metadata relating to IP and domain reputation to enhance existing data feeds, or consume as an independent data source. Gain additional intelligence to monitor, assess and remediate as required.
Data Access
Query real-time DNS blocklists, covering IPs, domains and hashes (including malware files, cryptowallets, email addresses and URLs) to protect your email infrastructure, wider network and users.