Reduce resource overhead: Eliminate the need to remediate infected user machines by stopping threats before they spread.
Edge
Protection
Immediate protection at your network edge. Block potentially harmful connections from and to known malicious IPs, including cybercrime hosters, hijacked networks, and botnet C2s.
Secure the edge
protect
your network
Use Border Gateway Protocol (BGP) to secure your network edge with real-time protection against malicious IPs. Deploy threat intelligence data at the routing level using BGP, and automatically block communications to and from IPs involved in the most dangerous cybercrimes, before they cause irreparable damage. This solution works with any BGP-capable device, including routers and modern firewalls, making it simple to integrate into existing infrastructure.
Strengthen your perimeter security and build lasting resilience, creating a safer, more secure network.
Prevent data loss and ransomware incidents: Block infected devices within your network from communicating with botnet C2s, stopping data exfiltration and malware progression.
Protect your network: Stop botnets from spreading laterally by blocking malicious connections at its source, rather than remediating follow-up infections.
Edge Protection
Data access
Our real-time IP-based datasets block connections to and from malicious IP addresses at the network edge using existing hardware.
Border Gateway Protocol
Block the worst-of-the-worst at the network perimeter, using your existing BGP-capable appliances. Our data delivered via BGP Firewall is highly precise and low risk to block, targeting only verified malicious sources.
Edge Protection
Related Solutions
Looking for more? Enhance protection with these related email and network solutions.
DNS Protection
Automatically block malicious activity at the DNS level, to safeguard your network and users against a variety of online threats.
Email Protection
Block more than 99% of spam and other email-related threats including malware, ransomware, phishing emails, and more.
Email Compliace
Minimize risk, protect users, and maintain a clean, compliant email-sending environment with trusted data and expert insights from Spamhaus.

With the botnet C&C listings on BGP Firewall, and the botnet C&Cs on the DNS Firewall utilizing similar data, it’s like two extra layers of protection.
Dave Godglick
Network Manager, Mornington Communications
Featured content
See all resources
Need Help?
Get in touch
Spamhaus is committed to protecting and respecting your privacy. We’ll only use your personal information to respond to your enquiry, manage any accounts you may set-up, and to provide the products and services you request from us. From time to time, we would like to contact you about our products and services, as well as other security related content that may be of interest to you. If you consent to us contacting you for this purpose, please tick the box below.
You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.
By clicking submit below, you consent to allow Spamhaus to store and process the personal information submitted above to provide you the content requested.
I agree to receive other communications from Spamhaus.