Image

What is the Blocklist?

What is the Blocklist?

AntiSocial Blocklist is an extensive collection of potentially malicious domains. We work hard scouring the internet looking for servers that are trying to impersonate common brands and the companies you do business with. Using our data, we then use our cloud platform to protect vulnerable computer users. You may not spot the IDN characters in iCล‚oud.com or the zero in Micr0Soft.com - But AntiSocial Blocklist will.

AntiSocial Blocklist is an extensive collection of potentially malicious domains. We work hard scouring the internet looking for servers that are trying to impersonate common brands and the companies you do business with. Using our data, we then use our cloud platform to protect vulnerable computer users. You may not spot the IDN characters in iCłoud.com or the zero in Micr0Soft.com - But AntiSocial Blocklist will.

Image

UK Community Version

Try The Community Version

Many devices and services around your workplace will allow you to block domains. Maybe it's a Pi-hole® or a router. It could be your proxy, firewall or your email gateway. Whatever the application, AntiSocial Blocklist community version will be easy to implement.


Domains Updated Hourly

Image

Try The UK Community Version

Many devices and services around your workplace will allow you to block domains. Maybe it's a Pi-hole® or a router. It could be your proxy, firewall or your email gateway. Whatever the application, AntiSocial Blocklist community version will be easy to implement.


Domains Updated Hourly

Updated Continually

The internet is scanned continually, we look for new and existing domains likely to be malicious and used inactive social engineering attacks.

Reduce The Risk

Your staff want to access website.com they don't want to be tricked into visiting wéb-s.lte.com - help protect them from these common attacks.

Reduce Phishing Emails

Many smart systems are fantastic at stopping phishing emails, but they may work too late - or not at all. Our strategy uses proven and simple blocklisting methods incorporated into Office365.

Typo, IDN, Hyphenation & More

We understand the way social engineers swap and exchange characters in order to trick us. Our blocklists work to identify the most popular methods.

Updated Continually

The internet is scanned continually, we look for new and existing domains likely to be malicious and used inactive social engineering attacks.

Reduce The Risk

Your staff want to access website.com they don't want to be tricked into visiting wéb-s.lte.com - help protect them from these common attacks.

Reduce Phishing Emails

Many smart systems are fantastic at stopping phishing emails, but they may work too late - or not at all. Our strategy uses proven and simple blocklisting methods incorporated into Office365.

Typo, IDN, Hyphenation & More

We understand the way social engineers swap and exchange characters in order to trick us. Our blocklists work to identify the most popular methods.

Updated Continually

The internet is scanned continually, we look for new and existing domains likely to be malicious and used inactive social engineering attacks.

Reduce The Risk

Your staff want to access website.com they don't want to be tricked into visiting wéb-s.lte.com - help protect them from these common attacks.

Reduce Phishing Emails

Many smart systems are fantastic at stopping phishing emails, but they may work too late - or not at all. Our strategy uses proven and simple blocklisting methods incorporated into Office365.

Typo, IDN, Hyphenation & More

We understand the way social engineers swap and exchange characters in order to trick us. Our blocklists work to identify the most popular methods.

SE Honeypot data

SE Honeypot data

Image

Listening For Scams

Listening For Scams

Feeding into the AntiSocial Blocklist, the SE Honeypot project will release mobile telephone numbers into the wild and record the nefarious ways they are used.

Incoming calls and SMS messages will be analysed and provide intelligence to organisations that can help minimise the impact of Voice and SMS based frauds.


Data thats powered by fraud

Data thats powered by fraud

  • Numbers disguised on the internet
  • We analyse the data
  • We output domains to block, intelligence on new frauds, warnings to the public.

Work with us to create something special

Work with us to create something special

Image

Become a client and we can secure you with our blocklist data. Our data feeds contain 2.6 Billion permutations of the top 100,000 UK websites and we look for malicious domains daily!

Clients can access the AntiSocial Blocklist via our restAPI. Many products can integrate the API to provide real time analysis on domains - blocking emails and web traffic!

Image

Become a client and we can secure you with our blocklist data. Our data feeds contain 2.6 Billion permutations of the top 100,000 UK websites and we look for malicious domains daily!

Clients can access the AntiSocial Blocklist via our restAPI. Many products can integrate the API to provide real time analysis on domains - blocking emails and web traffic!


Our Products

Image

Pentesting


Extensive Social Engineering, External Penetration and Web Application Assessments - exposing human and technical weaknesses.

Learn More
Image

AntiPhish


AntiPhish Phishing Prevention combines educational phishing campaigns with a realistic experience.

Learn More
Image

Blocklist


AntiSocial Blocklist identifies if domains are likely to be used for social engineering – before an attack.

Learn More
Image

Knowledge Lab


A combination of effective learning methods that are tailored to your organisation - resulting in true security awareness.

Learn More
Image

Pentesting


Extensive Social Engineering, External Penetration and Web Application Assessments - exposing human and technical weaknesses.

Learn More
Image

AntiPhish


AntiPhish Phishing Prevention combines educational phishing campaigns with a realistic experience.

Learn More
Image

Blocklist


AntiSocial Blocklist identifies if domains are likely to be used for social engineering – before an attack.

Learn More
Image

Knowledge Lab


A combination of exciting learning methods that are tailored to your organisation - resulting in true security awareness.

Learn More

Receive our newsletters

Blogs • Security News • Event Invites • Company News • Tips & Advice

    By ticking this box you acknowledge you have read and understood The AntiSocial Engineer's Privacy Policy and you consent to the processing of your personal data for marketing purposes. You can unsubscribe from our newsletter at any time using the link at the end of each newsletter.

    Receive our newsletters


      By ticking this box you acknowledge you have read and understood The AntiSocial Engineer's Privacy Policy and you consent to the processing of your personal data for marketing purposes. You can unsubscribe from our newsletter at any time using the link at the end of each newsletter.

      Let's Get Social

      Follow Us On Twitter
      Connect On Linkedin
      Like Us On Facebook