Upgrading your ThreatSTOP-powered Infoblox DNS Firewall Feed to Next-Gen DNS Firewall? Click here for training.

Are you ready to start blocking threats? We are.


Leverage ThreatSTOP's live threat intelligence to block known and emerging threats such as ransomware, botnets, and more.


Secure your environment by redirecting users away from malicious sites.


Make threat intelligence actionable with powerful reports that provide insight and enable remediation.


ThreatSTOP protects against ransomware, DDoS, Phishing, botnets, and more by automatically delivering live threat data to your network devices. A cloud-based service, it works with existing devices—no new hardware, no training. Set your custom policy, and immediately begin deflecting attacks, and preventing data theft.

ThreatSTOP IP Firewall Service

Block inbound attacks and prevent data theft

ThreatSTOP DNS Firewall

Block, redirect and understand



“When we began using the product on premise, we immediately saw what was hitting our firewall on a regular basis. Definitely a success story for us.”
- Christopher Ackerman, Application System Analyst for Operation Smile



"ThreatSTOP has eliminated manual blacklisting and remediation, and reduced help desk tickets related to malware by 90%, to only 1-2 per month."
- Mike Connors, Information Security Analyst for University of Baltimore


Utilities & Infrastructure

"By automating the process and providing the reports, ThreatSTOP provides me a peace of mind and saves me time."
- Carol Maffitt, CIO of Phoenix Energy Systems



Security Assessment Tools

Check IP

Insert IP address to check if it is passing malicious traffic



Paste an IP address here to block future malicious activity



Copy and paste device logs to identify malicious traffic


What is ThreatSTOP?

How does ThreatSTOP Work?

What People Are Saying

"Using ThreatSTOP Shield, we were able to set and enforce custom policies and immediately begin blocking unwanted traffic—spam and DDoS attacks—with little or no false positives. This also eliminated threat actors’ attempts to gather information via scanning. Overall network traffic was reduced by 25 percent, which freed up our other security devices to work on more elusive threats. In addition, ThreatSTOP Shield helped us to control threats brought onto the network via BYOD devices."

- Todd Wolfe, Site Director, Meta Solutions -- Athens

"We evaluated a couple other solutions, however, when you consider the cost of the competition vs the benefits, it simply made sense to go with ThreatSTOP. The reality is that we felt ThreatSTOP met and exceeded our expectations, and we really liked the fact that it was easy to use, easy to implement and easy to maintain."

- Kenneth Compres, the Sr. Information Security and Integrations Engineer -- Hillsborough Community College