Skip to main content

Block IP - Generic v3

This Playbook is part of the Common Playbooks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This playbook blocks malicious IP addresses using all integrations that are enabled. The direction of the traffic that will be blocked is determined by the XSOAR user (and set by default to outgoing) Note the following:

  • some of those integrations require specific parameters to run, which are based on the playbook inputs. Also, certain integrations use FW rules or appended network objects.
  • Note that the appended network objects should be specified in blocking rules inside the system later on.

Supported integrations for this playbook [Network security products such as FW/WAF/IPs/etc.]:

  • Check Point Firewall
  • Palo Alto Networks PAN-OS
  • Zscaler
  • FortiGate
  • Aria Packet Intelligence
  • Cisco Firepower
  • Cisco Secure Cloud Analytics
  • Cisco ASA
  • Akamai WAF
  • F5 SilverLine
  • ThreatX
  • Signal Sciences WAF
  • Sophos Firewall


This playbook uses the following sub-playbooks, integrations, and scripts.


  • Prisma SASE - Block IP
  • Cisco FirePower- Append network group object
  • PAN-OS - Block IP - Static Address Group
  • Checkpoint - Block IP - Custom Block Rule
  • PAN-OS - Block IP - Custom Block Rule
  • Sophos Firewall - Block IP
  • PAN-OS DAG Configuration


  • F5Silverline
  • Zscaler


  • IsIntegrationAvailable
  • IsIPInRanges
  • SetAndHandleEmpty


  • zscaler-blacklist-ip
  • aria-block-dest-subnet
  • akamai-add-elements-to-network-list
  • threatx-block-ip
  • threatx-blacklist-ip
  • fortigate-ban-ip
  • sigsci-blacklist-add-ip
  • sw-block-domain-or-ip
  • appendIndicatorField
  • enrichIndicators
  • createNewIndicator
  • f5-silverline-ip-object-add
  • cisco-asa-create-rule

Playbook Inputs#

NameDescriptionDefault ValueRequired
IPAn array of malicious IPs to block. Enter a comma-separated list of IPs (i.e.:,
CustomBlockRuleThis input determines whether Palo Alto Networks Panorama or Firewall Custom Block Rules are used.
Specify "True" to create new Custom Block Rules (2 FW rules inside the PAN-OS device).
For "False" - no rules will be created.
LogForwardingPanorama log forwarding object name. Indicate what type of Log Forwarding setting will be specified in the PAN-OS custom rules.Optional
AutoCommitThis input determines whether to commit the configuration automatically on PAN-OS devices and other FWs.
Yes - Commit automatically.
No - Commit manually.
StaticAddressGroupThis input determines whether Palo Alto Networks Panorama or Firewall Static Address Groups are used.
Specify the Static Address Group name for IPs list handling.
TagInsert a tag name with which indicators will get tagged. This tag can be used later in the External Dynamic Lists integration by using the tag for filtering IPs in the indicator query.Optional
DAGThis input determines whether Palo Alto Networks Panorama or Firewall Dynamic Address Groups are used.
Determine the Dynamic Address Group tag for IPs list handling.
UserVerificationPossible values: True/False. Default: True.
Whether to provide user verification for blocking those IPs.

False - No prompt will be displayed to the user.
True - The server will ask the user for blocking verification and will display the blocking list.
InternalRangeA list of internal IP ranges to check IP addresses against. The comma-separated list should be provided in CIDR notation. For example, a list of ranges would be: ",," (without quotes).lists.PrivateIPsOptional
SiteNameSignal Sciences WAF - Enter the site name for the integration to be applied. The site name can be found in your instance console.Optional
AkamaiNetworkListIDAkamai's WAF network list ID, which is mandatory to be mentioned for the integration. The chosen IPs will be added to this ID.Optional
InputEnrichmentPossible values: True/False . Default: False
Enrich the input IP address/es with reputation commands.
RuleNameThe rule name/description that will be presented on the created rule in certain integrations (if there is a need).
The supported integrations: PAN-OS, CheckPoint.

Default input- "XSOAR - Block IP playbook - ${}"
XSOAR - Block IP playbook - ${}Optional
RuleDirectionDetermine if a newly created rule should be with the network direction of outbound or inbound blocked traffic.
Possible values: inbound or outbound
Default: outbound
DAGNameThis input determines whether Palo Alto Networks Panorama or Firewall Dynamic Address Groups are used.
Determine the Dynamic Address Group name for IPs list handling.
FolderFor prisma SASE usage - Specify the scope for a newly created security rule to be applied.
Remember, this input will only be used when there is no input to the CategoryName.
Default: Shared

Playbook Outputs#

Aria.BlockDestSubnet.RuleThe rule name/ID which was created in the system for this playbook.unknown
Aria.BlockDestSubnet.StatusThe status of the command that created the rule above.unknown
Stealthwatch.IP.idThe ID of the object created in Cisco Secure Cloud Analytics.unknown
Stealthwatch.IP.identifierThe value of the object created in Cisco Secure Cloud Analytics.unknown
CiscoASA.Rules.IDThe rule ID that was created in Cisco ASA for this playbook.unknown
CiscoASA.Rules.SourceThe rule's source object that was set in the associated rule.unknown
CiscoASA.Rules.DestThe rule's destination object that was set in the associated rule.unknown
CiscoASA.Rules.IsActiveThe rule's state that was set in the associated rule.unknown
SigSciences.Corp.Site.Blacklist.IDSignal Sciences created rule ID.unknown
SigSciences.Corp.Site.Blacklist.SourceSignal Sciences blocked address in a dedicated rule.unknown
SigSciences.Corp.Site.Blacklist.CreatedBySignal Sciences - the blocking rule's creator name.unknown
PrismaSaseThe root context key for Prisma SASE integration output.unknown
PrismaSase.AddressGroupThe Prisma Access Address group object.unknown
PrismaSase.SecurityRuleCreated security rule.unknown
PrismaSase.SecurityRule.profile_settingThe Security rule group object in the rule.unknown
PrismaSase.CandidateConfigConfiguration job object.unknown
PrismaSase.AddressCreated address object.unknown

Playbook Image#

Block IP - Generic v3