Echelon Use Cases
Find out if a host is targeting your organisation
In the search bar above, enter an IP address to query the Echelon database. Try 203.167.203.212 for example. This will take you to the details page for this IP address.
If the host is classified as Malicious, it has been observed by our sensors attempting to scan or exploit multiple destination organisations.
Block malicious IPs from your organisation's network
Search for a tag using tag:<tag_name>. Try tag:Telnet Bruteforcer for example.
You can access a dynamic blocklist using the tag's normalised name (e.g. "SSH Bruteforcer" becomes "ssh-bruteforcer"). Query for the normalised tag name in /api/tag/block/[tag-name] e.g. /api/tag/block/ssh-bruteforcer
This URL can be used in your firewall as a dynamic block list / external dynamic list. See the following links for configuring Palo Alto NGFWs and Fortigate Firewalls.