Skip to main content

Try Hacker Blocker free for 15 days

Download Hacker Blocker for Windows and see the difference instantly on busy public servers.

  • Good for 1 Windows Server for 15 days
  • Imports over 770 million IPs into Windows Firewall
  • Gets hourly updates from our Master Blocklist
  • When installed on every Endpoint, synchronizes all Windows Firewalls
  • Fully Automated - install it and forget it

Need a more robust trial? Contact us.

Re-Discover Your Server's True Power

No high-pressure sales, no spam, no credit card required.
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

What Does Hacker Blocker Do?

There is nothing like Hacker Blocker on the market today. The result of 7 years of research and development, it updates the Native Windows Firewall every hour with new IP Addresses used by malicious actors worldwide.

Easy Deployment

Installs in seconds and runs as a Windows Service to ensure a small footprint. Upon installation, it parses over 770 million IPs into the Windows Firewall from our Master Blocklist.

Fully Automated

Every hour, Hacker Blocker updates the Windows Firewalls from the Master Blocklist, which we update 24/7/365. When one of us is attacked, all are protected from that attacker.

Windows Server or PC

Hacker Blocker works on Windows Server, Windows 10 & 11. Be sure to choose the correct version when ordering!

Want to skip the trial and jump right in?


Government Pricing

Contractor Information

Contract #: 47QTCA22D00BJ
Contractor: TRIG WEB DESIGN, LLC
Address: 33A REBECCA CIR
HUDSON, NH 03051-3160
Phone: 617-819-5877
E-Mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Web Address: http://www.trigwebdesign.com
SAM UEI: KZVLG45QLW54
NAICS: 511210
Socio-Economic : Small business
EPLS : Contractor not found on the Excluded Parties List System
Govt. Point of Contact:
Jay Johnson
Contract Clauses/Exceptions:
View the specifics for this contract
Source
Title

Multiple Award Schedule

Contract Number

47QTCA22D00BJ

Contractor T&Cs /Pricelist
Current Option Period End Date

Aug 1, 2027

Ultimate Contract End Date

Aug 1, 2042

Category

511210   
OLM    

View Catalog

adv sm

Frequently Asked
Questions

Have a question not addresses here? Contact our experts today at (800) 626-3520

How Do Licenses Work?

Hacker Blocker for Windows Licensing

Windows PC -  Single user license is for one Activation on a single device. You can move an Activation from one device to another 3 times, called 'Deactivations' per license. If you need more Deactivations, you can request them in your Customer License Portal or call support.

Windows Server edition - Licenses are assigned to a physical OSE of Windows Server for up to 25 users or virtual OSEs, with two activations assigned. For Enterprise and Datacenter editions with more than 25 OSEs, contact our Volume License department.

Volume Licenses can be ordered online or by calling our sales department at (617) 819-5877. We can also customize your license options for easy tracking and deactivations of licenses on individual machines.

Our Customer License Portal allows Customers to organize and control license options easily, and we can help customize your Portal for easy management.

email: This email address is being protected from spambots. You need JavaScript enabled to view it. or call (617) 819-5877 to speak to a licensing specialist.

Linux / Unix / WHM

For Linux machines, we use Secure FTP (sFTP) connections to upload our Blocklist to your CSF path every 15 minutes, in whichever format needed i.e.: csf.deny. We offer paid subscriptions through our website here.

How Do Hackers Attack My Business?

Hackers have a multi-pronged approach to attacking American businesses and agencies. Most attacks are random, usually on your website or in the form of spam / phishing and attacks looking for vulnerabilities. When one is found, it is exploited.

Website & Email attacks include:

  • Thousands of WP-Admin logins per hour
  • SQL Injections
  • Form and Comment spam
  • Direct File Inclusions (malware/viruses)
  • Denial-of-Service Attacks
  • Email Bombing
  • Phishing

Meanwhile, your public-facing servers are dealing with the same 'noise' attacks, while dealing with Windows-specific attacks such as Exchange Server exploits from Ransomware-as-a-Service (RaaS), Eavesdropping, Network Denial-of-Service Attacks, Spoofing, RTP Relays, Spim Attacks, Viruses & Worms, and so on, and so on.

These attacks result in slow networks, websites and email delivery; affecting productivity, increasing IT costs, and in worse cases, ransomware nightmares.

How Does Hacker Blocker Protect From Ransomware?

Ransomware attacks vary in their techniques, from simple phishing and malware infections to sophisticated proxy-shell flaw exploits. Hacker Blocker adds blockades to Ransomware at multiple stages:

  1. We research and block IP addresses and CIDRs used by Ransomware actors, including known RaaS (Ransomware as a Service) organizations such as BlackByte, which attacked the San Francisco 49ers on Superbowl Sunday, 2/13/2022
  2. We block IPs used by email servers that spread malware and phishing emails, substantially reducing the amount of spam and phishing emails
  3. We block IPs used by malware programs to communicate with their servers, stopping their ability to do their dirty work
  4. We recommend adding roles such as Anti-Ransomware FSRM to your servers, and educating staff to avoid phishing schemes

Exchange Servers using Hacker Blocker see immediate decreases in spam and phishing emails, increasing overall performance.

What happens when my plan expires?

Windows - When your subscription expires, Hacker Blocker removes the firewall Rules it installed in Windows. Once you renew, it will download and apply the latest Rules once more.

Linux / LAMP - if your subscription expires, the IPs and CIDRs Hacker Blocker added are removed and no further updates are applied.

Is there a free trial available?

We do not offer a free trial, but we can offer free Detection, Reporting and Blocking apps for your website with every Linux order.

Can I upgrade my subscription later?

Yes! you can add user licenses for Windows Server, additional PC licenses or upgrade your Linux version to Unlimited website coverage.

What if I'm only interested in one feature from a different plan?

We can customize any plan to your needs. Just contact sales for a free consultation.

Can I cancel my subscription at any time?

Yes, you can cancel Hacker Blocker at any time, simply cancel your subscription online, uninstall the Windows version, or contact us for Linux cancellations.

What Is "The Blocklist"?

The Hacker Blocker Blocklist has been compiled since 2016, and includes IP addresses & CIDRs of reported cyber-attacks from around the world. Our process is both reactive and proactive, as we collect attack reports from our customers as they happen, and from outside agencies before they happen to our customers.

  1. As attacks happen to our clients, we collect the IP address and research its origin
  2. Using our Whois tools, we find the CIDR of the IP. This can range from one to a million IPs on a single CIDR
  3. The CIDR is added to our own live firewalls, if it matches our criteria
  4. Our updated Blocklist is generated from our live firewall lists every 15 minutes

We only block the CIDR if it matches certain criteria:

  • Small Network with multiple attack reports
  • Large network from countries unfriendly to the USA (i.e.: Russia)
  • Not a University or Medical Institution
What Does Hacker Blocker Do To My Computer?

Hacker Blocker installs a Service on your Windows machine that communicates with our secure servers and aquires our latest Blocklist. It then parses this list into Rules in your Windows Firewall. Hacker Blocker then updates your Firewall Rules every hour, as we constantly add and remove entries.

PopUp Aholic

Hacker Blocker has changed their name to

aegis-def-logo.png

www.aegiscds.com

Stand by while we forward  you automatically