If you have ever experienced the pain of standard country blocking you'll know that turning a country off will introduce a whole new set of problems.  With today's global makeup of businesses turning a country off maybe more work than you expected.  You need the power of PacketViper to filter them!

PacketViper, LLC has taken Geo IP (country) network filtering to a new level by providing Global Network Lists. Our comprehensive proprietary lists contain network addresses of popular Internet based businesses which you may wish to allow or block. Malicious IP networks and IP lists are built from an extensive global network of PacketVipers® which are placed discretely through-out the world.

Our GNL's are designed to give network administrators the ability to quickly filter networks which have been known to send spam, harbor hackers, vulnerable, CnC, or of good intent.  Utilizing our lists help improve accuracy, reduce bandwidth usage, spam and other network threats for less restricted countries.

Global Network Lists are constantly updated by our crack network security teams and published to PacketVipers automatically so that you always have the latest information.

The GNLs provide network administrators with an additional layer of protection from countries which they must otherwise leave unfiltered (for instance, your home country).  Additionally, an administrator can filter an entire GNL, or choose to only filter specific ports.  For example, you may choose to block only port 25 traffic from a spam-based GNL while allowing all other traffic through.  Global Network Lists are designed to give administrators more filtering granularity.
GNL Categories
Honey Pot

We have many Packetviper's in the world and from select participating customers setup as Honey Pot's, which contain many different triggers and rules. The honeypot systems sit quietly, and once triggered they are recorded, and added to our GNL.  We provide this list to our customers to protect themselves from the malicious activity. We try not to have our customers reinvent the wheel.
        SANS.ORG defines them as this.

    1.    Learn how intruders probe and attempt to gain access to your systems. The general idea is that since a record of the intruder’s activities is kept, you can gain insight into attack methodologies to better protect your real production systems.

    2.    Gather forensic information required to aid in the apprehension or prosecution of intruders. This is the sort of information often needed to provide law enforcement officials with the details needed to prosecute The common line of thought in setting up Honey Pot systems is that it is acceptable to use lies or deception when dealing with intruders.


Surgically filtering them like PacketViper does is a whole new experience. PacketViper provide the granularity, and a easy to use interface to tailor network traffic to your needs.


Consider these the Microsofts, Googles, Yahoo's, BlackBerry, VMWare, PayPal, Ebay, Amazon of the world.  These are the common business of the world, and designed for customers who want to ensure communication flows cleanly.  We have found that these large organizations use many different networks which are not necessary registered to their business.  So we did the leg work and grouped them together.  These are changing monthly.


Not all businesses have malicious intent but occasionally overlook something when setting up public internet services. When these public services are exploited and used to spam, proxy, scan, and such to our PacketVipers they are classified as vulnerable.  For instance a cable provider DHCP range, and a end user has a virus, or vulnerable port which spammed and attempted to access something behind a PacketViper.


Are networks which participated in various attacks to our PacketViper's (DDOS, port scans, password scans, web or mail exploits to name some). Although most attacks come from vulnerable networks, some are habitual and have been graduated to threatening.


Spam categorized GNL's are networks and business which are know for spamming on a global scale.  We recommend blocking port 25 from these networks.